iodn

iodn / tap-ducky

Public

Turns any rooted phone into the legendary USB Rubber Ducky. Android USB HID Keystroke Injector

29
4
100% credibility
Found Feb 09, 2026 at 19 stars -- GitGems finds repos before they trend. Get early access to the next one.
Sign Up Free
AI Analysis
Dart
AI Summary

TapDucky is an open-source Android app that emulates USB keyboards and mice on rooted devices to execute automated keystroke and mouse scripts for testing and automation.

How It Works

1
📱 Download the app

Get TapDucky from GitHub releases and install it on your special-permission Android phone.

2
🔓 Unlock phone powers

Open the app and grant it permission to act like a special USB toy.

3
⌨️ Pick your gadget

Choose if it pretends to be a keyboard, mouse, or both to send actions.

4
✏️ Make a keystroke list

Create or grab a simple list of keystrokes and mouse moves to play back.

5
🔌 Connect to computer

Plug your phone into the target computer with a USB cable.

6
▶️ Hit play

Tap run and watch your phone automatically type or move the mouse on the computer.

âś… Mission complete

Check the logs to see everything worked perfectly and your actions ran smoothly.

Sign up to see the full architecture

5 more

Sign Up Free

Star Growth

See how this repo grew from 19 to 29 stars Sign Up Free
Repurpose This Repo

Repurpose is a Pro feature

Generate ready-to-use prompts for X threads, LinkedIn posts, blog posts, YouTube scripts, and more -- with full repo context baked in.

Unlock Repurpose
AI-Generated Review

What is tap-ducky?

TapDucky turns any rooted Android phone into a USB Rubber Ducky, emulating HID keyboards, mice, or composites for keystroke injection via ConfigFS. Built in Dart with Flutter, it runs full DuckyScript payloads—complete with validation, parameters, jitter, and controls like loops or functions—plus scheduling on triggers like app foreground or USB connect. Developers get a polished app for editing, importing from GitHub stores (even Digispark .ino conversion), logging executions, and device diagnostics, solving the need for portable HID testing without extra hardware.

Why is it gaining traction?

It stands out by packing a complete DuckyScript engine into a phone—no dongles or custom boards required—while adding user perks like live validation, runtime estimates, wakelocks for background runs, and dialer shortcuts for stealth triggers. The GitHub payload store with auto-validation hooks into existing Ducky communities, and keyboard layouts for global use make it practical for real workflows. Early adopters dig the Material 3 UI and structured logs over clunky alternatives.

Who should use this?

Security researchers and pentesters running authorized HID attacks on endpoints, hardware hackers prototyping USB gadgets, or Android tinkerers automating keystrokes via Ducky tap scripts. Ideal for field ops where you need a pocketable injector that handles mouse moves, media keys, and variables without lugging gear.

Verdict

Grab it if you're rooted and experimenting—solid README and features punch above 21 stars, though 1.0% credibility signals early maturity with room for more tests and community payloads. GPL3 keeps it open; test on physical devices first.

(198 words)

Sign up to read the full AI review Sign Up Free

Similar repos coming soon.