A community-driven repository of DuckyScript™ and Bash payloads designed for automating penetration testing and red team operations using the Hak5 Shark Jack device.
The Official Hak5 Shark Jack Payload Repository
This repository is used by penetration testers and red teamers to deploy pre-built or custom payloads on the Hak5 Shark Jack for network exploitation, security automation, and reconnaissance tasks. Users can leverage these payloads to automate attacks or testing scenarios in a compact, portable form factor.
Payloads are community-developed and Hak5 does not guarantee their functionality; users should test payloads thoroughly before use. Familiarity with DuckyScript™ and Bash scripting, as well as the Hak5 Shark Jack hardware, is recommended. Always ensure legal and ethical use of payloads in authorized environments.
Purchase or obtain a Hak5 Shark Jack device
Clone the repository using: git clone https://github.com/hak5/sharkjack-payloads.git
Explore payloads in the cloned directory
Use PayloadStudio (editor + compiler) to build or customize payloads
Deploy payloads to the Shark Jack device following Hak5 documentation
Refer to official Hak5 docs for device setup and payload deployment
Use PayloadStudio to edit and compile payloads
Edit existing payloads or create new ones in DuckyScript™ or Bash, then compile them for deployment on the Shark Jack.
Deploy payloads by copying compiled scripts to the Shark Jack device
Transfer payload files to the Shark Jack to execute automated penetration testing tasks.
Submit pull requests to contribute new or improved payloads
Community members can contribute by adding or modifying payload scripts in the repository.