SkillAgentSearch skills...

FLUCKY

Flucky - Advanced Bluetooth HID Attack Platform ๐Ÿฆ† Professional-grade wireless security testing tool featuring automatic BLE connectivity, psychological awareness testing, LOLBAS integration, and military-grade encryption. Built exclusively for authorized red teams, academic research, security awareness training, and educational purposes.

Install / Use

/learn @maruf009sultan/FLUCKY

README

<div align="center">

๐Ÿฆ† FLUCKY

Advanced Bluetooth HID Security Research Platform

<img src="https://img.shields.io/badge/Version-1.0.0-blue?style=for-the-badge&logo=semver" alt="Version"> <img src="https://img.shields.io/badge/Platform-ESP32-orange?style=for-the-badge&logo=espressif" alt="Platform"> <img src="https://img.shields.io/badge/License-Educational-green?style=for-the-badge&logo=github" alt="License"> <img src="https://img.shields.io/badge/Purpose-Research%20%7C%20Training%20%7C%20Academic-purple?style=for-the-badge" alt="Purpose">

A Professional-Grade Wireless Security Testing Tool for Authorized Red Teams, Security Awareness Training, and Academic Research


โš ๏ธ CRITICAL DISCLAIMER - READ BEFORE PROCEEDING

<table> <tr> <td>

๐ŸŽ“ ETHICAL USE ONLY - THIS IS NON-NEGOTIABLE

This tool is designed EXCLUSIVELY for:

  • โœ… Authorized security assessments with written permission
  • โœ… Academic research with institutional oversight and ethics board approval
  • โœ… Security awareness training with participant consent and knowledge
  • โœ… Personal systems you own and control completely
  • โœ… Educational environments with proper supervision and curriculum integration
  • โœ… Penetration testing engagements with signed scope documents
  • โœ… Red team exercises with explicit organizational authorization
  • โœ… Cybersecurity competitions (CTFs) with defined rules and boundaries

๐Ÿšซ STRICTLY PROHIBITED USES:

  • โŒ Unauthorized access to any systems you don't own
  • โŒ Malicious activities against individuals or organizations
  • โŒ Any illegal purposes whatsoever under any circumstances
  • โŒ Harassment, intimidation, or causing distress to any person
  • โŒ Data theft, espionage, or unauthorized information gathering
  • โŒ Disruption of services or causing denial of service
  • โŒ Installing malware, ransomware, or any harmful software
  • โŒ Violating any local, state, federal, or international laws
  • โŒ Bypassing security controls without explicit authorization
  • โŒ Using for personal gain at others' expense

โš–๏ธ LEGAL CONSEQUENCES OF MISUSE:

  • Criminal prosecution under computer fraud and abuse laws (CFAA, GDPR, etc.)
  • Civil liability for all damages caused to affected parties
  • Permanent criminal record affecting future employment
  • Loss of professional certifications (CISSP, CEH, OSCP, etc.)
  • Potential imprisonment depending on severity of offenses
  • Financial penalties that can exceed millions of dollars

By using this tool, you acknowledge that you have read, understood, and agree to:

  • Use it ONLY for legitimate, authorized security testing purposes
  • Obtain written permission before ANY testing activity
  • Follow ALL applicable laws, regulations, and organizational policies
  • Accept full legal and moral responsibility for your actions
  • Report any vulnerabilities discovered through responsible disclosure
  • Maintain the highest ethical standards in all operations
</td> </tr> </table> </div>

๐Ÿ“š Table of Contents

| Part | Section | Description | |------|---------|-------------| | 0 | ๐Ÿงญ Getting Started | The Creator's Manifesto & Ethical Foundation | | | ๐ŸŽฏ Why I Built FLUCKY | The Real Story Behind the Project | | | โš–๏ธ Ethical Usage Policy | Strict Ethical Usage Policy | | | ๐ŸŽ“ Educational Focus | Educational & Awareness Focus | | | ๐Ÿ‘จโ€๐Ÿ’ป About the Creator | About the Creator | | | ๐Ÿค How to Support | How to Support This Project | | | ๐Ÿ” Important Disclaimer | AI-Assisted Documentation Notice | | | ๐Ÿš€ Getting Started | Getting Started the Right Way | | I | โš™๏ธ Core Platform Overview | The Revolution in HID Attacks | | | ๐Ÿš€ Quick Start Guide | Quick Start Guide | | | ๐ŸŽฎ Core Command System | Command Structure & Basic Operations | | II | ๐Ÿ•ถ๏ธ Stealth Operations | Stealth, Encryption & Advanced Operations | | | ๐Ÿ” Encryption | Encryption & Security | | | ๐ŸŽญ Obfuscation | Obfuscation & Evasion | | | โฐ Timing & Scheduling | Timing & Scheduling | | | ๐Ÿ”„ Advanced Payload Management | Advanced Payload Management | | | ๐ŸŽช Chaos Mode | Chaos Mode & Behavioral Randomization | | | ๐Ÿ”ง Button Management | Button Management | | III | ๐Ÿดโ€โ˜ ๏ธ LOLBAS Integration | LOLBAS Integration | | | ๐Ÿง  Gaslighting | Psychological Operations | | | ๐ŸŽฏ Real-World Scenarios | Real-World Operational Scenarios | | | ๐Ÿ”ง Advanced OpSec | Advanced Operational Security | | | ๐ŸŽฏ Best Practices | Best Practices & Operational Guidelines | | IV | ๐Ÿ“‹ Command Reference | Complete Command Reference Table | | | ๐Ÿšจ Troubleshooting | Troubleshooting & Error Guide | | | ๐Ÿ”ง Advanced Configuration | Advanced Configuration Guide | | | ๐ŸŽฏ Advanced Patterns | Advanced Usage Patterns | | | ๐Ÿ”’ Security Best Practices | Security Best Practices | | | ๐Ÿค Community | Community & Contribution | | | ๐Ÿ“š Resources | Learning Resources | | | ๐ŸŽŠ Final Words | Final Words |


<div align="center">

Part 0: Getting Started - The Creator's Manifesto & Ethical Foundation

</div> <div align="center">

Built for Education, Designed for Awareness, Limited for Responsibility

"Great power requires greater responsibility. This is where that journey begins."

</div>

๐ŸŽฏ Why I Built FLUCKY - The Real Story

The Gap in the Market

For years, I watched and observed some significant limitations in existing HID security testing tools:

Missing psychological elements in security testing: Traditional tools focused purely on technical keystroke injection without considering the human element of security. They could execute commands, but they couldn't test whether users would notice subtle system anomalies, whether they would question unexpected behavior, or whether security awareness training was actually effective. Security is not just about technologyโ€”it's about people, processes, and technology working together. When tools only address the technology component, they leave a massive gap in comprehensive security assessment capabilities.

Poor operational security in available tools: Many existing tools had significant fingerprints that made them easily detectable. They would create obvious logs, have visible indicators of compromise, and leave traces that any competent security team could identify. In real-world red team operations, stealth is paramount. If your testing tool is detected immediately, you're not actually testing the organization's securityโ€”you're just confirming that they can spot obvious threats. True operational security requires multiple layers: no serial output, no LED indicators, encrypted payload storage, and behavioral patterns that mimic legitimate device activity.

Limited real-world testing capabilities for awareness training: Security awareness training often relies on theoretical scenarios or simulated phishing emails. But what about testing whether users would notice if their keyboard started behaving strangely? What about testing if they would report when windows mysteriously minimized or their Caps Lock key seemed to have a mind of its own? Traditional HID tools couldn't provide this kind of subtle, realistic security awareness testing. They were designed for exploitation, not for education.

Wireless limitations requiring physical access: Every HID tool I encountered required physical USB connection. This meant you had to physically plug a device into the target computer, dramatically increasing the risk of detection and limiting testing scenarios. In modern environments with strict physical security controls, this approach is often impractical or impossible. A wireless approach opens up entirely new possibilities for security assessment while maintaining the ability to conduct realistic tests.

I didn't just want to make another ducky clone. I wanted to create something that would actually advance the field and help security professionals do their jobs better. I wanted a tool that understood that modern security testing isn't just about breaking inโ€”it's about understanding how systems and people respond to subtle, sophisticated threats.

The Vision

FLUCKY represents what HID attack tools should be in 2025 and beyond:

๐Ÿ“ก Wireless and Flexible: The transition from wired to wireless represents more than just convenienceโ€”it's a fundamental shift in how security assessments can be conducted. Wireless operation through Bluetooth Low Energy (BLE) means that assessments can be conducted from a distance, without the suspicious behavior of physically connecting a device. This opens up testing scenarios that were previously impossible, such as assessing security in spaces with strict physical controls, testing whether users would notice unusual Bluetooth devices, or conducting assessments without the risk of leaving physical evidence at the target location.

๐Ÿง  Psychologically Sophisticated: Security isn't just tech

View on GitHub
GitHub Stars17
CategoryDevelopment
Updated16h ago
Forks0

Security Score

80/100

Audited on Mar 30, 2026

No findings