Red teams worldwide have successfully deployed Hak5 gear in sensitive environments with resounding success — often eavesdropping on and gleening so-called "Pentest Gold"; the credentials, keystrokes, screenshots and intellectual property that demonstrate real-world threats.
As recognized leaders in the physical pentest space, the Hak5 arsenal of On-Site Implants are built for discreet long-term deployments with the features and conveniences needed for successful threat simulations.
Cloud C² — remote access from your browser
DuckyScript™ — simple scripting language
Payload Studio — web-based script editor
Robust Payload Library and Documentation
A matchbook-sized linux box packing multiple network payloads - like packet sniffing, VPN tunneling and man-in-the-middle attacks.
A keylogger armed with pentest tools, remote access and payloads that trigger multi-vector attacks when chosen keywords are typed.
A stealthy video man-in-the-middle that captures screenshots or videos to disk and streams live to the Internet for remote viewing.
A Remote Access Toolkit posing as an ordinary USB Ethernet adapter. Drop it on a LAN for an instant backdoor shell.