upvote
Well, nothing malicious, and it would be to use between 2 of my own computers.
reply
They’re marketed and sold as pentesting devices but there’s no reason why somebody couldn’t use HID emulation to automate some boring IT tasks.

I’m curious about your use case. You have a server that you can’t ssh/vnc/rdp into, it has an open usb port, and using an $8 keyboard is a no-go?

Edit: If you ignore all the hacking language, it kind of looks like an O.MG Plug might accomplish what you’re looking for. https://shop.hak5.org/products/omg-plug

reply