๐Ÿฟ๏ธ

Packet Squirrel

Mark II โ€” Ethernet Man-in-the-Middle

A stealthy, pocket-sized Ethernet multi-tool. Capture packets, hijack networks, tunnel VPN connections, and deploy reactive payloads โ€” all at the flip of a switch.

MAN-IN-THE-MIDDLE PACKET CAPTURE DUCKYSCRIPT 2.0 BASH + PYTHON WIREGUARD CLOUD Cยฒ
The Man-in-the-Middle That's Nuts for Networks

The Packet Squirrel Mark II sits inline between a target device and the network, giving you full visibility and control over all traffic passing through. Matchbox-sized and powered via USB-C, it's designed to disappear behind a workstation, IP camera, or point-of-sale terminal. Run packet captures, poison DNS, deploy Meterpreter, tunnel to VPN, or exfiltrate traffic โ€” all controlled via web UI, SSH, or Cloud Cยฒ.

๐Ÿ’ป
Target Device
Target Ethernet Port
ETH โ†โ†’
๐Ÿฟ๏ธ
Packet Squirrel
Intercept ยท Modify ยท Exfiltrate
ETH โ†โ†’
๐ŸŒ
Network / Internet
Network Ethernet Port
Three Ways to Handle Traffic

Each payload selects a network mode that determines how traffic flows between the target and the network.

MODE
๐Ÿ”€
NAT
Target gets an address in the 172.16.32.x range. Squirrel acts as the gateway with full routing control. VPN-capable.
MODE
๐ŸŒ‰
BRIDGE
Transparent Layer 2 bridging. Target obtains IP directly from the real network. Invisible to the target. VPN-capable.
MODE
๐Ÿ”’
JAIL
Target is completely isolated from the network. Perfect for forensic analysis, malware sandboxing, and traffic inspection.
Ports & Controls
๐Ÿ”Œ
Target Ethernet
Connect target device here. Traffic flows through the Squirrel.
โ†– Upper left
๐ŸŒ
Network Ethernet
Connects to existing network/switch. Obtains IP via DHCP.
โ†— Upper right
โšก
USB-C Power
Power only โ€” any USB charger or power bank. No data.
โ†™ Lower left
๐Ÿ’พ
USB-A Storage
Attach USB drives (ext4/fat32/NTFS) for pcaps and loot.
โ†˜ Lower right
๐ŸŽ›๏ธ
4-Way Payload Switch
Positions 1โ€“3 for payloads, position A for arming/config mode.
โ–ผ Bottom
๐Ÿ’ก
RGB Status LED + Button
Multi-color status. Button for reboot, factory reset, or payload input.
โ–ฒ Front
Flip โ†’ Boot โ†’ Execute
1
Payload 1
First configurable payload slot
2
Payload 2
Second configurable payload slot
3
Payload 3
Third configurable payload slot
A
Arming
Web UI + SSH config mode
Key Features
โ–ธ
Packet Capture โ€” Full pcap capture to USB storage. Filter by protocol, port, or host. Capture gigabytes of traffic for offline analysis in Wireshark.
โ–ธ
VPN Tunneling โ€” WireGuard and OpenVPN support in any network mode. Tunnel target traffic through your VPN or establish remote access tunnels back to your infrastructure.
โ–ธ
DNS Spoofing โ€” SPOOFDNS command redirects DNS queries to your controlled server. Phish credentials, redirect updates, or inject malicious responses inline.
โ–ธ
Stream Filtering โ€” KILLSTREAM and KILLPORT selectively block traffic. DYNAMICPROXY intercepts and modifies HTTP/HTTPS streams in real time.
โ–ธ
Cloud Cยฒ โ€” Remote command and control from anywhere via browser. Deploy payloads, exfiltrate loot, and manage fleets of Packet Squirrels from a single dashboard.
โ–ธ
Web UI โ€” Built-in browser interface at 172.16.32.1:1471 for payload management, live configuration, and web terminal access. No SSH client required.
โ–ธ
Multi-Language Payloads โ€” Write payloads in DuckyScript, Bash, or Python 3 out of the box. Install additional interpreters via USB storage for other languages.
โ–ธ
Self-Destruct โ€” SELFDESTRUCT command wipes payloads, loot, and configuration from the device. Critical for red team operational security.
20+ Network-Specific Functions

The Mark II introduces powerful new DuckyScript commands designed specifically for network manipulation.

SPOOFDNS Redirect DNS queries to attacker-controlled addresses
DYNAMICPROXY Intercept and modify HTTP/S traffic inline
KILLPORT Silently block specific ports on the target
KILLSTREAM Drop all traffic matching specified criteria
SELFDESTRUCT Wipe all payloads, config, and loot from device
PCAP Start/stop packet capture to USB storage
NETMODE Set NAT, BRIDGE, or JAIL network mode
VPN Establish WireGuard or OpenVPN tunnel
DNS Spoofing + Packet Capture

This payload redirects the target's DNS to a controlled server while silently capturing all network traffic to USB.

#!/bin/bash
# Title: DNS Spoof + Full Capture
# Description: Redirect DNS and log all packets

# Configure network mode
NETMODE NAT
LED SETUP

# Spoof DNS โ€” redirect all queries to our server
SPOOFDNS * 10.0.0.50

# Start full packet capture to USB drive
PCAP /mnt/usb/loot/capture_$(date +%s).pcap
LED ATTACK

# Wait for button press to stop
BUTTON

# Cleanup
SPOOFDNS off
PCAP stop
LED FINISH
Deployment Scenarios
๐Ÿ•ต๏ธ
Covert Network Tap
Plant behind a target workstation in BRIDGE mode. Transparent to the target โ€” capture all traffic without disruption.
๐Ÿ”“
Credential Interception
DNS spoof login portals to capture credentials. Combine with DYNAMICPROXY for SSL stripping and form injection.
๐Ÿ›ก๏ธ
Hardware Firewall
Use JAIL mode as a portable network isolator. Inspect traffic from untrusted devices without exposing your network.
๐Ÿ”
VPN Router
Tunnel all target traffic through WireGuard. Protect yourself on hostile hotel or conference networks automatically.
๐Ÿ“น
IoT / Camera Audit
Plant inline with IP cameras, printers, or IoT devices. Capture and analyze their network behavior and phone-home traffic.
๐ŸŽ“
Network Training
Demonstrate MITM attacks, DNS poisoning, and traffic analysis in controlled lab environments with real hardware.