ExploitWareLabs - Forensic Analysis of an USB HID Attack(Rubber Duckey) The attack is performed with an USB Rubber Ducky. The device acts like an USB keyboard and is prepared with a Ducky
USB Drop Attack. “Look What I Found! Uh Oh… A USB.” | by SLIIT CS2 | Medium
FIN7 hackers target enterprises with weaponized USB drives via USPSSecurity Affairs
USB HID Attacks. USB HID devices are the way we interact… | by evildaemond | Heck the Packet | Medium
P4WNP1 Aloa HID Keyboard Attack | Tenaka
Kali Linux NetHunter for Nexus and OnePlus – The Game Zone