
Memory Type Mode Delay Size Indx Paged Size Size #Pages MinW MaxW ReadBackĮeprom 65 20 4 0 no 1024 4 0 9000 9000 0x00 0x00 User configuration file does not exist or is not a regular file, skipping User configuration file is "/root/.avrduderc" System wide configuration file is "/etc/nf" Read ("r") "flash" ROM of the device into "flash.hex" I have tried the following: $ sudo avrdude -p m32u4 -c avr109 -U flash:r:flash.hex -v -v Although, because this device is set as an HID keyboard I do not know if the methods I saw are the appropriate for this or maybe is just impossible to access the bootloader anymore. I have read that I can dump the binary from the bootloader using the tool avrdude.

Adafruit trinket 5v driver code#
I know that I cannot get directly the source code but I was planning to use a disassembler to do the translation. Which has an ATmega32u4 onboard chip and and USB bootloader "AVR109 compatible", according to its description on Adafruit's website.
Adafruit trinket 5v driver driver#
usbcore: registered new interface driver usbhid cdc_acm: USB Abstract Control Model driver for USB modems and ISDN adapters usbcore: registered new interface driver cdc_acm cdc_acm 1-4:1.0: ttyACM0: USB ACM device usb 1-4: Product: ItsyBitsy 32u4 5V 16MHz usb 1-4: New USB device strings: Mfr=1, Product=2, SerialNumber=3

usb 1-4: New USB device found, idVendor=239a, idProduct=800e, bcdDevice= 1.00 usb 1-4: new full-speed USB device number 5 using xhci_hcd

Whether it is a malicious device, a prank, or an automation tool I want to find what's it purpose and the code. It was recognized as a keyboard by the system, and started clicking and typing. I recently found in my office a suspicious device which I plugged in a spare computer.
