Thank you for visiting us! The shop is in catalogue mode. It is not yet possible to buy online. If you are interested in a product, please contact us. See you later!

Hak5 Key Croc

Keylogger armed with penetration testing tools

Stock Status: Inquire about price and availability
Inquire about price and availability
This item is currently out of stock and cannot be purchased.

Description

Hak5 Key Croc

- keylogger armed with penetration testing tools,
- multiple attack vectors,
- penetration testing from anywhere, live in a web browser with Cloud C2,
- function that triggers attacks after entering specific keywords,
- built-in USB Type-A socket,
- emulates devices such as serial port, storage, HID, Ethernet,
- simple configuration

Accessories (additionally paid)
- Key Croc E-Book
- Payload Studio Pro
- C2 - Hak5 Cloud Command and Control

Product features:
Plug and Play, no configuration required
Web browser support - Cloud C2 function
Undetectable thanks to automatic cloning of hardware identifiers of the connected keyboard
Changing the function to a flash drive using a hidden button
RGB LEDs indicating the work status
Ducky Script 2.0 keyboard emulation function
Direct access to the network via USB Ethernet emulation
Quad-core 1.2 GHz ARM processor and 8 GB SSD memory
Root access to Debian
WiFi module with integrated 2.4 GHz antenna
Input connector USB type A socket
Output connector USB type A plug
 

Hak5 Key Croc, keylogger uzbrojony w narzędzia do testów penetracyjnych, wiele wektorów ataku,Plug and Play, nie wymaga konfiguracji, obsługa przeglądarki internetowej,funkcja Cloud C2, automatyczne klonowanie identyfikatorów sprzętowych,funkcja emulacji klawiatury, Ducky Script 2.0, bezpośredni dostęp do sieci, emulacja USB Ethernet, system Debian z uprawnieniami roota, Keylogger armed with penetration testing tools, multiple attack vectors, no configuration required, web browser support, Cloud C2 function, automatic hardware ID cloning, keyboard emulation function, direct network access, USB Ethernet emulation, Debian system with root privileges, Keylogger ausgestattet mit Penetrationstest-Tools, mehreren Angriffsmethoden, keine Konfiguration erforderlich, Webbrowser-Unterstützung, Cloud C2-Funktion, automatisches Klonen der Hardware-ID, Tastaturemulationsfunktion, direkter Netzwerkzugriff, USB-Ethernet-Emulation, Debian-System mit Root-Rechten, narzędzie dla profesjonalistów ds. bezpieczeństwa, etyczny haker, narzędzia dla etycznego hakera, narzędzie pentesterskie, narzędzia hakerskie, narzędzie do ataków hotplug,hotplug, HID, Human Interface Device, Hak5, security professional tool, ethical hacker, ethical hacker tools, pentester tool, hacking tools, hotplug attack tool, Sicherheitsprofi-Tool, ethischer Hacker, Tools für ethische Hacker, Pentester-Tool, Hacking-Tools, Hotplug-Angriffstool,badusb, HID keyboard, HID usb, open hardware, pentesting, usb hid, USB HID Keyboard,

Similar Products