Is installed on your USB drive, and it uses Kali Linux, which is the Linux distribution focused around security (pentesting etc.). It runs directly on the victim computer, detects your external drive as well as all other drives, and exfiltrates data to your USB drive.
For operator safety, Drive Badger boots only after manual choosing "Live USB Persistence" or "Live USB Encrypted Persistence" option in Kali Linux boot menu. In case of no action, ordinary Kali Linux is run, without access to the partition containing exfiltrated data, and Drive Badger code itself.
Is installed on your own computer (Raspberry Pi, laptop, or even desktop computer), and it uses Debian, Ubuntu, Raspbian or Kali Linux. Computer with Mobile Badger recognizes connected:
Mobile devices (all brands and models that connect to the computer using USB, and support either MTP or PTP protocol for transferring data):
USB Mass Storage devices:
Mobile Badger, as opposed do Drive Badger, doesn't need any screen or keyboard to run. It runs fully headless, and all events are shown on external LCD/LED display device.