HAK5 Plunder Bug
145.00 $HAK5 Plunder Bug is a passive LAN tap for stealthy packet capture and network analysis—compact, USB-C powered, and available now in Lebanon.
Showing 49–64 of 126 results
HAK5 Plunder Bug is a passive LAN tap for stealthy packet capture and network analysis—compact, USB-C powered, and available now in Lebanon.
The HAK5 Rubber Ducky Textbook – 2nd Edition is the definitive guide to mastering USB HID attacks and payload scripting using the iconic HAK5 Rubber Ducky. Updated with modern techniques, tools, and examples. Includes 40 exercises and 8 projects.
Hotplug attack, meet LAN. These pocket-sized pentest boxes perform network assessments in seconds!
As tiny Linux computers, they run DuckyScriptâ„¢ payloads powered by Bash. Armed out-of-the-box with an ultra fast network scanner, you’ll get recon with the flick of a switch.
Or flip the switch to arming mode and sync up with the online library for a plethora of payloads — remote access, exfiltration & more.
With feedback by RGB LED, and now live in-shell with USB-C Serial on the NEW Cable edition.
The HAK5 Shark Jack Cable is a USB-C powered Ethernet attack tool for continuous payload deployment—compact, efficient, and now available in Lebanon.
Pull off the most creative and complex hotplug attacks.
The Hak5 USB Rubber Ducky, now in Lebanon, is a powerful keystroke injection tool disguised as a flash drive. Execute rapid payloads, bypass defenses, and customize attacks with DuckyScriptâ„¢ 3.0 and Payload Studio. Perfect for cybersecurity professionals and red teams!
Protect your privacy with this compact hidden camera detector lens. Equipped with bright red LEDs, it helps you locate hidden cameras by revealing their lens reflections. Simply peer through the detector’s lens and scan your surroundings to spot concealed surveillance devices in seconds. Lightweight and portable, it’s perfect for travel, home, or office use. Stay secure and in control wherever you go!
HT627 multi-field EMF meter for detecting and measuring electric, magnetic, and RF radiation.
Handheld iCopy X100 RFID Programmer with color screen and all-frequency support—includes 5 cards, 5 fobs, and ships quickly in Lebanon.
IPEX/U.FL to SMA or RPSMA Female RG178 cable, available in various lengths.
Connect internal RF modules to external antennas with this IPEX U.FL to SMA adapter cable. Available in 2 length options.
Universal Type-C IR remote blaster for Android and iOS—control TVs, A/C units, and more with your phone.
The Key Croc by Hak5 is a keylogger armed with pentest tools, remote access and payloads that trigger multi-vector attacks when chosen keywords are typed. It’s the ultimate key-logging pentest implant.
More than just recording and streaming keystrokes online, it exploits the target with payloads that trigger when keywords of interest are typed.
64GB Kingston microSD Card with 100MB/s speed, Class 10 UHS-I, A1-rated, and includes SD adapter for full compatibility.
The LAN Turtle is a covert Systems Administration and Penetration Testing tool providing stealth remote access, network intelligence gathering, and man-in-the-middle surveillance capabilities through a simple graphic shell.
Housed within a generic “USB Ethernet Adapter” case, the LAN Turtle’s covert appearance allows it to blend into many IT environments.
The Malicious Cable Detector detects all known malicious USB cables. Additionally, the Detector functions as a data blocker for safe charging. It analyzes cable behavior 200,000 times per second by using side channel power analysis.
High-security contactless cards featuring NXP’s DESFire EV3 chip with 2KB memory, AES-128 encryption, and ISO/IEC 14443-4 compliance. Ideal for secure access, payment systems, and e-government applications. Printable white PVC surface.