Open source Rubber Ducky clone
Built on microdevt, Driven by LUFA
This project is more than just another keystroke-injection toy. It’s built using microdevt, a lightweight C framework designed for rapid embedded development, created by the project's author. Microdevt provides everything from asynchronous timers to a modular scheduler, giving the firmware solid structure without unnecessary bloat.
For USB communication, it leverages the tried-and-true LUFA stack, modified to fit the project’s architecture and compiled for the ATmega16u2, a microcontroller that conveniently supports native USB.
Remote-Controlled Keystroke Injection
Instead of relying on a timed payload or an always-on device, this Rubber Ducky clone uses an SYN480R1 RF receiver to wait quietly for a wireless activation signal. That makes it ideal for physical penetration testing scenarios where an insider can plug the device into a machine ahead of time, then trigger it remotely when the target is away or distracted.
Payloads are written in a subset of DuckyScript, compiled with a custom script compiler included in the repo. The reduced instruction set covers the basics, enough to craft impactful keystroke sequences without overcomplicating the parser.
Built for Hackers, Shared with Hackers
This project doesn’t hide behind binaries or closed-source firmware. Everything is available on GitHub—including the microdevt framework, the script compiler, and even the KiCad schematics for hardware replication or modification.
It's a solid example of how thoughtful engineering, open tooling, and a bit of radio wizardry can come together to make a powerful pen-testing device. It's not just a clone—it’s an evolution.
Check out the full source on GitHub