A highly customizable USB attack platform for penetration testing, based on a Raspberry Pi Zero.
P4wnP1 is a customizable USB attack platform built on a Raspberry Pi Zero, designed for penetration testing and red teaming. It emulates various USB devices to perform attacks like credential theft, system unlocking, and covert backdoor access on target machines, particularly Windows systems. The project provides a framework for executing complex, automated payloads through USB HID, network, and storage interfaces.
Security professionals, penetration testers, and red teamers who need a low-cost, flexible hardware tool for physical security assessments and post-exploitation. It is suited for those conducting authorized tests against Windows environments and air-gapped systems.
Developers choose P4wnP1 for its advanced features like HID covert channels, modular payload system, and WiFi relay capabilities at a fraction of the cost of commercial alternatives. Its open-source nature allows deep customization and community-driven development, making it a powerful tool for sophisticated attack simulations.
P4wnP1 is a highly customizable USB attack platform, based on a low cost Raspberry Pi Zero or Raspberry Pi Zero W.
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Provides remote shell access on air-gapped Windows targets by tunneling communication solely through HID devices and relaying it via WiFi, as detailed in the HID backdoor payload section.
Automatically cracks grabbed password hashes and unlocks Windows machines with weak passwords using keyboard emulation, demonstrated in the Windows LockPicker payload with video demos.
Supports composite USB setups including HID keyboard, mass storage, RNDIS, and CDC ECM with Plug and Play compatibility, allowing flexible attack vectors without driver issues.
Built on low-cost Raspberry Pi Zero (around $5-11), making it an affordable alternative to commercial tools like BashBunny, as highlighted in the feature comparison table.
Maintained primarily by one developer with sparse community contributions, and a successor (P4wnP1 A.L.O.A.) is in private development, risking future updates and support.
Requires advanced knowledge of bash scripting, payload configuration, and security concepts, with no graphical interface, as evidenced by the lengthy, technical README and reliance on external resources.
Restricted to Raspberry Pi Zero hardware, which has a low-performance single-core CPU and may not support all features on other devices, limiting scalability and performance.
Some advanced capabilities, like TCP socket tunneling through HID channels, are not yet implemented, as admitted in the 'Currently missing features' section of the README.
P4wnP1 is an open-source alternative to the following products: