The leading rogue access point and WiFi pentest toolkit for close access operations. Passive and active attacks analyze vulnerable and misconfigured devices.
Simple and powerful multi-function USB attack and automation platform for penetration testers and systems administrators.
Covert Systems Administration and Penetration Testing tool providing stealth remote access, network intelligence gathering, and man-in-the-middle surveillance capabilities through a simple graphic shell.
Stealthy pocket-sized man-in-the-middle. This Ethernet multi-tool is designed to give you covert remote access, painless packet captures, and secure VPN connections with the flip of a switch.
Keylogger armed with pentest tools, remote access and payloads that trigger multi-vector attacks when chosen keywords are typed.
Control entire fleets of Hak5 Gear with Cloud C2. Whether you're an enthusiast, pentester or red teamer.
Pocket-sized LAN Tap that lets you “bug” Ethernet connections with USB-C convenience.
Jack into a network and instantly run advanced recon, exfiltration, attack and automation payloads.
Wireless test equipment featuring an array of 14 finely tuned 802.11 WiFi radios. It lets pentesters and IT professionals monitor and record all 2.4 GHz WiFi channels simultaneously.
Covert inline screen grabber that sits between HDMI devices
Keystroke injection tool disguised as a generic flash drive. Computers recognize it as a regular keyboard and accept pre-programmed keystroke payloads at over 1000 words per minute.
Signals intelligence platform with a unique design allowing it to be planted discreetly, or taken with you on any engagement.