A stealthy, pocket-sized Ethernet multi-tool. Capture packets, hijack networks,
tunnel VPN connections, and deploy reactive payloads โ all at the flip of a switch.
The Packet Squirrel Mark II sits inline between a target device and the network,
giving you full visibility and control over all traffic passing through. Matchbox-sized
and powered via USB-C, it's designed to disappear behind a workstation, IP camera,
or point-of-sale terminal. Run packet captures, poison DNS, deploy Meterpreter,
tunnel to VPN, or exfiltrate traffic โ all controlled via web UI, SSH, or Cloud Cยฒ.
๐ป
Target Device
Target Ethernet Port
ETH
โโ
๐ฟ๏ธ
Packet Squirrel
Intercept ยท Modify ยท Exfiltrate
ETH
โโ
๐
Network / Internet
Network Ethernet Port
// Network Modes
Three Ways to Handle Traffic
Each payload selects a network mode that determines how traffic flows between the target and the network.
MODE
๐
NAT
Target gets an address in the 172.16.32.x range. Squirrel acts as the gateway with full routing control. VPN-capable.
MODE
๐
BRIDGE
Transparent Layer 2 bridging. Target obtains IP directly from the real network. Invisible to the target. VPN-capable.
MODE
๐
JAIL
Target is completely isolated from the network. Perfect for forensic analysis, malware sandboxing, and traffic inspection.
// Hardware Layout
Ports & Controls
๐
Target Ethernet
Connect target device here. Traffic flows through the Squirrel.
โ Upper left
๐
Network Ethernet
Connects to existing network/switch. Obtains IP via DHCP.
โ Upper right
โก
USB-C Power
Power only โ any USB charger or power bank. No data.
โ Lower left
๐พ
USB-A Storage
Attach USB drives (ext4/fat32/NTFS) for pcaps and loot.
โ Lower right
๐๏ธ
4-Way Payload Switch
Positions 1โ3 for payloads, position A for arming/config mode.
โผ Bottom
๐ก
RGB Status LED + Button
Multi-color status. Button for reboot, factory reset, or payload input.
โฒ Front
// Switch Positions
Flip โ Boot โ Execute
1
Payload 1
First configurable payload slot
2
Payload 2
Second configurable payload slot
3
Payload 3
Third configurable payload slot
A
Arming
Web UI + SSH config mode
// Capabilities
Key Features
โธ
Packet Capture โ Full pcap capture to USB storage. Filter by protocol, port, or host. Capture gigabytes of traffic for offline analysis in Wireshark.
โธ
VPN Tunneling โ WireGuard and OpenVPN support in any network mode. Tunnel target traffic through your VPN or establish remote access tunnels back to your infrastructure.
โธ
DNS Spoofing โ SPOOFDNS command redirects DNS queries to your controlled server. Phish credentials, redirect updates, or inject malicious responses inline.
โธ
Stream Filtering โ KILLSTREAM and KILLPORT selectively block traffic. DYNAMICPROXY intercepts and modifies HTTP/HTTPS streams in real time.
โธ
Cloud Cยฒ โ Remote command and control from anywhere via browser. Deploy payloads, exfiltrate loot, and manage fleets of Packet Squirrels from a single dashboard.
โธ
Web UI โ Built-in browser interface at 172.16.32.1:1471 for payload management, live configuration, and web terminal access. No SSH client required.
โธ
Multi-Language Payloads โ Write payloads in DuckyScript, Bash, or Python 3 out of the box. Install additional interpreters via USB storage for other languages.
โธ
Self-Destruct โ SELFDESTRUCT command wipes payloads, loot, and configuration from the device. Critical for red team operational security.
// DuckyScript Commands
20+ Network-Specific Functions
The Mark II introduces powerful new DuckyScript commands designed specifically for network manipulation.
SPOOFDNSRedirect DNS queries to attacker-controlled addresses
DYNAMICPROXYIntercept and modify HTTP/S traffic inline
KILLPORTSilently block specific ports on the target
KILLSTREAMDrop all traffic matching specified criteria
SELFDESTRUCTWipe all payloads, config, and loot from device
PCAPStart/stop packet capture to USB storage
NETMODESet NAT, BRIDGE, or JAIL network mode
VPNEstablish WireGuard or OpenVPN tunnel
// Payload Example
DNS Spoofing + Packet Capture
This payload redirects the target's DNS to a controlled server while silently capturing all network traffic to USB.
#!/bin/bash # Title: DNS Spoof + Full Capture # Description: Redirect DNS and log all packets
# Configure network mode NETMODENAT LEDSETUP
# Spoof DNS โ redirect all queries to our server SPOOFDNS* 10.0.0.50
# Start full packet capture to USB drive PCAP/mnt/usb/loot/capture_$(date +%s).pcap LEDATTACK
# Wait for button press to stop BUTTON
# Cleanup SPOOFDNSoff PCAPstop LEDFINISH
// Use Cases
Deployment Scenarios
๐ต๏ธ
Covert Network Tap
Plant behind a target workstation in BRIDGE mode. Transparent to the target โ capture all traffic without disruption.
๐
Credential Interception
DNS spoof login portals to capture credentials. Combine with DYNAMICPROXY for SSL stripping and form injection.
๐ก๏ธ
Hardware Firewall
Use JAIL mode as a portable network isolator. Inspect traffic from untrusted devices without exposing your network.
๐
VPN Router
Tunnel all target traffic through WireGuard. Protect yourself on hostile hotel or conference networks automatically.
๐น
IoT / Camera Audit
Plant inline with IP cameras, printers, or IoT devices. Capture and analyze their network behavior and phone-home traffic.
๐
Network Training
Demonstrate MITM attacks, DNS poisoning, and traffic analysis in controlled lab environments with real hardware.