Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Well, nothing malicious, and it would be to use between 2 of my own computers.




They’re marketed and sold as pentesting devices but there’s no reason why somebody couldn’t use HID emulation to automate some boring IT tasks.

I’m curious about your use case. You have a server that you can’t ssh/vnc/rdp into, it has an open usb port, and using an $8 keyboard is a no-go?

Edit: If you ignore all the hacking language, it kind of looks like an O.MG Plug might accomplish what you’re looking for. https://shop.hak5.org/products/omg-plug




Consider applying for YC's Winter 2026 batch! Applications are open till Nov 10

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: