AUTONOMOUS EXPLOITATION VIA MALWARE INJECTION USING RASPBERRY PI

  • Unique Paper ID: 176071
  • PageNo: 5311-5313
  • Abstract:
  • The Autonomous Exploitation via Malware Injection is an advanced USB attack framework designed for penetration testing and cybersecurity research. It is built for the Raspberry Pi Zero W/2W, transforming it into a malicious HID (Human Interface Device) that can execute automated payloads for exploitation, data exfiltration, and privilege escalation. This project provides a modular and customizable platform for offensive security testing. This framework allows security professionals to simulate real-world attack scenarios, including keystroke injection, remote shell execution, Wi-Fi phishing, and persistence mechanisms. It can bypass security controls such as User Account Control (UAC), antivirus detection, and endpoint security policies by executing obfuscated payloads.

Copyright & License

Copyright © 2026 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

BibTeX

@article{176071,
        author = {Sanjai J and Hari Vikas M and Saravanan K and Hariharan S},
        title = {AUTONOMOUS EXPLOITATION VIA MALWARE INJECTION USING RASPBERRY PI},
        journal = {International Journal of Innovative Research in Technology},
        year = {2025},
        volume = {11},
        number = {11},
        pages = {5311-5313},
        issn = {2349-6002},
        url = {https://ijirt.org/article?manuscript=176071},
        abstract = {The Autonomous Exploitation via Malware Injection is an advanced USB attack framework designed for penetration testing and cybersecurity research. It is built for the Raspberry Pi Zero W/2W, transforming it into a malicious HID (Human Interface Device) that can execute automated payloads for exploitation, data exfiltration, and privilege escalation. This project provides a modular and customizable platform for offensive security testing. This framework allows security professionals to simulate real-world attack scenarios, including keystroke injection, remote shell execution, Wi-Fi phishing, and persistence mechanisms. It can bypass security controls such as User Account Control (UAC), antivirus detection, and endpoint security policies by executing obfuscated payloads.},
        keywords = {Malicious HID, Automated Payloads, Exploitation, Data Exfiltration, Privilege Escalation, Modular Platform, Offensive Security, Keystroke Injection, Remote Shell Execution, Wi-Fi Phishing, Persistence Mechanisms.},
        month = {April},
        }

Cite This Article

J, S., & M, H. V., & K, S., & S, H. (2025). AUTONOMOUS EXPLOITATION VIA MALWARE INJECTION USING RASPBERRY PI. International Journal of Innovative Research in Technology (IJIRT), 11(11), 5311–5313.

Related Articles