ilusm.dev

kylg

keystroke injection, HID attacks, USB exploitation.

Load with: use kylg

Quick example

use kylg

result = kykey("value")
prn(result)

Functions

HID keyboard injection

kykey(device)

Performs the operation. Takes device.

kykey1(h)

Performs the operation. Takes h.

kykey2(h, report)

Performs the operation. Takes h, report.

Key scancodes

kykey3()

Performs the operation.

Type string

kykey4(h, text, delay_ms)

Performs the operation. Takes h, text, delay_ms.

Hotkey combinations

kykey5(h, modifiers, key)

Performs the operation. Takes h, modifiers, key.

Payload drop

kykey6(h, url, filename)

Performs the operation. Takes h, url, filename.

Keylogger detection

kykey7()

Performs the operation.

USB Rubber Ducky payload

kykey8(script_text)

Performs the operation. Takes script_text.

kykey9(h, commands)

Performs the operation. Takes h, commands.

BadUSB payloads

kykey10(url, payload_name)

Performs the operation. Takes url, payload_name.

kykey11(cmd)

Performs the operation. Takes cmd.

kykey12(cmd)

Performs the operation. Takes cmd.

Mouse injection

kykey13(device)

Performs the operation. Takes device.

kykey14(h, x, y)

Performs the operation. Takes h, x, y.

kykey15(h, button)

Performs the operation. Takes h, button.

Keylogger (recording)

kykey16(output_file)

Performs the operation. Takes output_file.

kykey17(h)

Performs the operation. Takes h.

kykey18(h)

Performs the operation. Takes h.

Keystroke fuzzing

kykey19(h, count)

Performs the operation. Takes h, count.

Notes

  • Key/value logging with structured fields.