The WHID Elite is an open-source, multi-purpose offensive device designed for cybersecurity professionals, penetration testers, and enthusiasts.

The WHID Elite offers a versatile platform for conducting various offensive security operations, including network penetration testing, social engineering, and physical security assessments.

WHID Elite is a GSM-enabled Open-Source Multi-Purpose Offensive Device that allows a threat actor to remotely inject keystrokes, bypass air-gapped systems, conduct mousejacking attacks, do acoustic surveillance, RF replay attacks and much more. In practice, is THE Wet Dream of any Security Consultant out there!

Original Product Description

WHID Elite Features

  • 2G/GSM Networks remote control
  • Remote Audio surveillance
  • Mouse-jacking Attacks
  • RF Replay Attacks
  • Remote HID Injection
  • Weaponize USB Devices

Hardware Inside

  • Microphone
  • GSM SIM800L
  • NRF24 Chip
  • Battery Adapter
WHID Elite
WHID Elite

Hardware Needed

  • WHID Elite
  • Lipo Battery 1000mAh
  • JST-PH 1.25 Connector
  • 433 Mhz Modules TX/RX
  • 2G/GSM SIM Card

2G / GSM Networks Remote Control

Remote Audio Surveillance

Mouse-jacking Attacks

Mouse-jacking attacks involve exploiting vulnerabilities in wireless mice and keyboards to intercept or inject keystrokes remotely. These attacks can be used by malicious actors to gain unauthorized access to systems, exfiltrate sensitive information, or execute arbitrary commands.

Similar to other wireless device attacks, mouse-jacking attacks highlight the importance of securing wireless communications and understanding potential security risks.

Hardware Implant Design

The WHID Elite is designed as a compact hardware implant that can be discreetly inserted into target systems or environments. Its small form factor and USB connectivity make it suitable for covert deployment in a wide range of scenarios.

Conclusion

In summary, the WHID Elite is a powerful and versatile offensive security tool that empowers cybersecurity professionals and enthusiasts to conduct targeted attacks and security assessments with ease. Its open-source nature, combined with its extensive feature set, makes it a valuable addition to any security toolkit.

However, it’s important to use such tools responsibly and ethically, respecting the privacy and security of others at all times.

WHID Elite Git

How to configure your Evil Crow RF

Categorized in:

Hacking Devices,

Tagged in: