kylg
keystroke injection, HID attacks, USB exploitation.
Load with: use kylg
Quick example
use kylg
result = kykey("value")
prn(result)
Functions
HID keyboard injection
kykey(device)
Performs the operation. Takes device.
kykey1(h)
Performs the operation. Takes h.
kykey2(h, report)
Performs the operation. Takes h, report.
Key scancodes
kykey3()
Performs the operation.
Type string
kykey4(h, text, delay_ms)
Performs the operation. Takes h, text, delay_ms.
Hotkey combinations
kykey5(h, modifiers, key)
Performs the operation. Takes h, modifiers, key.
Payload drop
kykey6(h, url, filename)
Performs the operation. Takes h, url, filename.
Keylogger detection
kykey7()
Performs the operation.
USB Rubber Ducky payload
kykey8(script_text)
Performs the operation. Takes script_text.
kykey9(h, commands)
Performs the operation. Takes h, commands.
BadUSB payloads
kykey10(url, payload_name)
Performs the operation. Takes url, payload_name.
kykey11(cmd)
Performs the operation. Takes cmd.
kykey12(cmd)
Performs the operation. Takes cmd.
Mouse injection
kykey13(device)
Performs the operation. Takes device.
kykey14(h, x, y)
Performs the operation. Takes h, x, y.
kykey15(h, button)
Performs the operation. Takes h, button.
Keylogger (recording)
kykey16(output_file)
Performs the operation. Takes output_file.
kykey17(h)
Performs the operation. Takes h.
kykey18(h)
Performs the operation. Takes h.
Keystroke fuzzing
kykey19(h, count)
Performs the operation. Takes h, count.
Notes
- Key/value logging with structured fields.