Filter By

Availability

Availability

Price

Price

  • €0.00 - €4,200.00

PC espionage - PC monitoring.

PC espionage - PC monitoring.

PC espionage - PC monitoring.

Active filters

VIDEO SPY of your PC, SECRETLY CREATES IMAGES FROM YOUR MONITOR. Dvi

Does he need to monitor the work of your employees? We have a hardware novelty for you that captures exactly what someone sees on their screen. Nothing is easier than a spy of your PC, you just need to plug in and automatically create images of your monitor and more importantly no software captures it. Only you will know that you are monitoring the computer in question and no one will see the pictures without a password. The device also records the current time, so you know exactly when the images were taken. Time is independent of your computer, so even if someone changes the timeline on your PC, it won't fool our device.

It's practically a small video recorder of your computer. We offer the device in dvi or vga design on the port of the graphics card.

€149.00
Quick-view

KEY-LOGGER GRABBER-873 CEZ WI-FI PREMIUM PS2-2G VER. HARDVER ZAZ

Devices for capturing (record) keyboard presss connected through a PS2 port. New market 2011 over WiFi network. Hardware memory registers each keyboard stroke in internal memory and can be sent over WiFi devices. Data from this device can later be downloaded and analyzed on a monitored or other computer. All data is protected by 128 bit encryption, no one reads the data without a password.

A computer keyboard spy ing device can work continuously for 12 months and spy on your PC.

€172.00
Quick-view

KEY-LOGGER GRABBER-872 CEZ WI-FI PREMIUM USB-2G VER. HARDVER NA

Devices for capturing (record) keyboard presss connected through a PS2 port. New market 2011 over WiFi network. Hardware memory registers each keyboard stroke in internal memory and can be sent over WiFi devices. Data from this device can later be downloaded and analyzed on a monitored or other computer. All data is protected by 128 bit encryption, no one reads the data without a password.

A computer keyboard spy ing device can work continuously for 12 months and spy on your PC.

€175.00
Quick-view

WI-FI WEP-755 CRACKER 802.11B/G NASTAVENOU ŠIFROVACOU METÓDOU W

USB Wi-Fi bezdr tov adaptér vybaven v esmerovou anténou s vysok m ziskom je mo né pou va ako klasick r diov adaptér pre pripojenie k sie am Wi-Fi tandardu 802.11. V spojen s dod van m softvérom je v ak jeho hlavn m poslan m n jdenie hesla akejko vek dostupnej bezdr tovej siete s nastavenou 

K takto zabezpe enej r diové sieti sa nie je mo né pripoji" bez znalosti hesla. Pr ve za elom n jdenia tohto ifrovacieho k a boli vyvinuté algoritmy, ktoré vyu vaj slab n kryptovacie met d zabezpe enia WEP. Softvér pou va d myselné kryptografické algoritmy ved ce k prelomeniu WEP ifrovanie a n jdenie ifrovacieho k a a teda aj pr stupového hesla k sieti.

€149.24
Quick-view

USB-KEELOG+TIME-PROFI COMPUTER KEYBOARD SPY

It's a small i'll allow you to claim a premium electronic USB device that is connected between the keyboard and the computer via a USB connector.

Hardware memory writes every keypad blow to internal EEPROM memory, assigning the current time and date to each text!

This key spy can later be downloaded and analyzed to decode everything that happened on the PC depending on the time.

A computer keyboard spy hardware detector capable of monitoring up to 260,000,000,000,000 keys written to your computer via a PS/2 keyboard or USB ( according to purchased ver. ) This means that it can work continuously for 6 months and spy on the whole thing on the PC.

It's actually a small radiotechnical device plugged in in the middle of a standard PS/2 or USB keyboard and personal computer.

€150.25
Quick-view

COMPUTER KEYBOARD SPY 2GB FLASH PS/2+ACCELERATOR

Keyboard capture (recording) devices connected via ps2 port. New on the market 2009. The device cannot be used on a USB keyboard through the reduction that is attached. This is only used to read the data. Hardware memory writes every keypad to internal memory. Data from this device can later be downloaded and analyzed on a monitored or other computer. All data is protected by 128 bit encryption, without password data no one reads.

€89.00
Quick-view

KEYLOGGER SPY COMPUTER KEYBOARD AGENT007-USB – 2GB

Computer Keyboard Spy AGENT007-USB – 2GB (KEY Katcher) PROFI VERSION, It is a small electronic device that is connected between the keyboard and the computer.

Hardware memory writes every punch to the keyboard in internal unproprescribed EEPROM memory. This key spy can later be downloaded and analyzed by our software to decode everything that happened on the PC.

€99.00
Quick-view

WiFi Pineapple TETRA ver 19, HACK WiFi

WiFi Pineapple TETRA ver 2017

Hak5 is excited to introduce a dual band (2.4/5 GHz) solution to its 6th generation wireless auditing arsenal -- the WiFi Pineapple Tetra.

Building on the successes and feedback of its predecessor, the WiFi Pineapple Tetra addresses the need for a rock solid dual-band penetration testing base station with exceptional performance.

With two discrete dual-band (2.4/5 GHz) Atheros 2:2 MIMO radios, the WiFi Pineapple Tetra leverages a fast PCI Express bus and four integrated high gain amplifiers to provide the penetration tester with unprecedented auditing capabilities.

Combined with the usability improvements of the 6th generation software platform, the WiFi Pineapple Tetra is the ultimate tool for wireless penetration testing.

€354.00
Quick-view

WIFI PINEAPPLE MARK V STANDARD HACK WiFi

The WiFi Pineapple is a unique device developed by Hak5 for the purpose of WiFi auditing and penetration testing. Since 2008 the WiFi Pineapple has grown to encompass the best rogue access point features, unique purpose-built hardware, intuitive web interfaces, versatile deployment options, powerful software and hardware development aids, a modular application ecosystem and a growing community of passionate penetration testers.

€159.00
Quick-view

OPEN SOURCE FLASH-DRIVE SIZED COMPUTER

USB armory from Inverse Path is an open source hardware design, implementing and flash drive sized computer.

The compact USB powered device provides a platform for developing and running a variety of applications.

The security features of the USB armory System on a Chip (SoC), combined with the openness of the board design, empower developers and users with a fully customizable USB trusted device for open and innovative personal security applications.

The hardware design features the NXP i.MX53 processor, supporting advanced security features such as secure boot and ARM® TrustZone®.

The USB armory hardware is supported by standard software environments and requires very little customization effort. 

€298.80
Quick-view

KEYLOGGER NANO SPY COMPUTER KEYBOARD AGENT007-USB – 16MB

Spy computer keyboard micro AGENT007-USB – 16MB (KEY Katcher NANO) PROFI VERSION, only 2.5cm long.  

Devices for capturing (record) keyboard presses. The device is micro large, a little smaller memory, but the capacity is absolutely sufficient for 2 months of recording. It is a small electronic device that is connected between the keyboard and the computer.

€103.20
Quick-view

A BLUETOOTH MONITOR OR WIRELESS MONITOR

AIRcable Host XR Most Powerful CSR BlueCore 04 Chip at AMP 

Monitor and monitor bluetooth devices (keyboards, wireless devices to GSM phones, communication between them and analyze them for your needs) 

Or just transfer your data via bluetooth over greater distances.

€324.00
Quick-view

PROXMARK III , RFID RESEARCH

This device can do almost anything involving almost any kind of low (125 kHz) or high (13.56 MHz) frequency RFID tag. It can act as a reader. It can analyze the signal received over the air more closely, for example to perform an attack in which we derive information from the tag's instantaneous power consumption.

It can analyze the signal received through the air, for example, to perform an attack in which we derive information from the tag's instantaneous energy consumption. It can pretend to be a tag itself. It can pretend to make a mark in itself. It is also capable of some less obviously useful operations that might come in handy for development work. It is also capable of some less obviously useful operations that could come in handy for developmentwork.

€499.00
Quick-view

TOUCHATAG STARTER PACKAGE HF RFID READER

USB HF RFID reader + 10 brands touchatag starting kit, can be used to create your Internet of Things. With touchatag, objects can be intelligent and applications can become available using a simple touch. Usage: From links between your toddler toys to websites to creating or customizing your own loyalty or rental service, the app's touchatag starter package is limited only by your imagination. Content: Touchatag Starter kit includes one USB RFID reader RFID tags and 10 (smart stickers). System requirements: Usb reader works with PC Windows XP and Vista and MacOSX 10.4 or higher (Intel version). Technical: The USB reader operates at 13.56MHz (high frequency RFID) and has a reading distance of about 4 cm (1.5 inches) when used with touchatag RFID tags.

€60.00
Quick-view

KEYSY RFID DUPLICATOR, COPY RFID WITH ONE PRESS 958-20

It can back up to four RFID key access credentials to a small device in the driver design.

Keysy RFID Duplicator, copy RFID with one push 958-20

Keysy is a new product that can back up to four RFID key access credentials into a small device in driver design. It unites all your RFID on one of your keychains so you can keep the originals at home and you don't have to pay expensive replacement fees if you lose them.

Two simple steps to RFID_Security

€116.40
Quick-view

HIDDEN REMOTE ACCESS AND ANONYMOUS PACKET CAPTURE THE PACKET SQUIRREL

The multi-purpose hardware is designed to provide you with hidden remote access, painless packet capture, and secure VPN connections using that switch.

Hidden remote access and anonymous packet capture of The Packet Squirrel-957 by Hak5

This Ethernet multi-purpose hardware is designed to provide you with hidden remote access, painless packet capture, and secure VPN connections using that switch.

€148.80
Quick-view

KEYLOGGER SPY COMPUTER KEYBOARD AGENT007-USB – 2GB

Spy computer keyboard AGENT007-USB – 2GB (KEY Katcher) PROFI VERSION Device for capturing (record) keyboard presses.

It is a small electronic device that is connected between the keyboard and the computer.

Hardware memory writes each keypad stroke into the internal unwritten EEPROM memory. This keyboard spy can later be downloaded and analyzed by our software to decode everything that happened on your PC.

€99.60
Quick-view

GEAR-959 FOR PENETRATION TESTS AND OTHER USES.

Pocket Network Attack Q3 2019 portable network attack tool is a pentesters best friend optimized for social engineering engagements and opportunistic wired network auditing.

Gear-959 for penetration tests and other uses. This portable network attack tool is Pentester's best friend, optimized for social engineering tasks and occasional wired network audits. It is functional and works with a very fast nmap payload (payload) that allows you to search quickly and easily on a LAN network. Thanks to simple scripting language and attack/activation switch, load load load is a breeze, and RGB LED provides instant feedback on the stages of an attack.

€134.40
Quick-view

USB RUBBER DUCKY DELUXE, HACK PC

USB Rubber Ducky provides a powerful payload in seconds by readied the benefits of the natural credibility of target computers while deceiving a person by posing as a plain USB drive.

Imagine if you could go to your computer, attach a seemingly innocent USB drive and let it install the back door, exfiltrate documents, steal passwords or any number of favorite tasks.

€132.00
Quick-view

LAN TURTLE IS A HIDDEN SYSTEM ADMINISTRATION SYSTEM AND PENETRATION TEST TOOL

LAN Turtle is a hidden system administration system and penetration test tool providing secret remote access, network intelligence collection and human surveillance through a simple graphics shell.

With the hidden appearance of the LAN Turtle, which is located in the generic "USB Ethernet Adapter" case, this computer fits into many IT environments.

€151.20
Quick-view

AGENT007-128KB-KLAV MODULE PROFI SPY COMPUTER KEYBOARD.

Capture (record) keyboard keys. It is a small electronic device that must be plugged (installed) directly into the keyboard or into the computer.

Hardware memory writes each keyboard press to internal unprescribed EEPROM memory. This key spy can be downloaded later ( you change the keyboard for another) and you begin to analyze our software to decode everything that happened on the PC.

€77.65
Quick-view

PandwaRF Rogue Pro

PandwaRF Rogue Pro is ideal for physical pentesters and cyber security professionals. PandwaRF provides several additional features, making it the perfect tool for advanced brutal coercion.

€930.00
Quick-view

PandwaRF Marauder Basic

Pocket portable RF tool for autonomous capture of RF data, typically keystrokes (alarms, cars, gate openers).

€1,198.80
Quick-view

PandwaRF Marauder Standard

Pocket portable RF tool for autonomous capture of RF data, typically keystrokes (alarms, cars, gate openers).

€1,548.00
Quick-view

PandwaRF Marauder Ultimate

Pocket portable RF tool for autonomous capture of RF data, typically keystrokes (alarms, cars, gate openers).

€4,198.80
Quick-view

USB armory Mk II with cover

€197.63
Quick-view

USB Armory Stick Mark 2

The USB Armory of Inverse Path is an open source hardware design, implementing the size of a computer flash drive. New version of USB Armory Stick Mark 2.

€0.00
Quick-view

VIDEO SPY of your PC, SECRETLY CREATES IMAGES FROM YOUR VGA MONITOR

Does he need to monitor the work of your employees? We have a hardware novelty for you that captures exactly what someone sees on their screen. Nothing is easier than a spy of your PC, you just need to plug in and automatically create images of your monitor and more importantly no software captures it. Only you will know that you are monitoring the computer in question and no one will see the pictures without a password. The device also records the current time, so you know exactly when the images were taken. Time is independent of your computer, so even if someone changes the timeline on your PC, it won't fool our device.

VGA version-875. It's practically a small video recorder of your computer. We offer the device in vga or Dvi design on the graphics card port.

€169.00
Quick-view

copy of WiFi Pineapple TETRA ver 19, HACK WiFi

WiFi Pineapple TETRA ver 2017

Hak5 is excited to introduce a dual band (2.4/5 GHz) solution to its 6th generation wireless auditing arsenal -- the WiFi Pineapple Tetra.

Building on the successes and feedback of its predecessor, the WiFi Pineapple Tetra addresses the need for a rock solid dual-band penetration testing base station with exceptional performance.

With two discrete dual-band (2.4/5 GHz) Atheros 2:2 MIMO radios, the WiFi Pineapple Tetra leverages a fast PCI Express bus and four integrated high gain amplifiers to provide the penetration tester with unprecedented auditing capabilities.

Combined with the usability improvements of the 6th generation software platform, the WiFi Pineapple Tetra is the ultimate tool for wireless penetration testing.

€374.40
Quick-view

KEY CROC by Hak5 is a keylogger armed with pentest tools

Hak5 is a keylogger equipped with pentest tools, remote access and payloads that trigger multi-vector attacks when entering selected keywords. It is the ultimate key-logging pentest implant.

€177.60
Quick-view

BASH BUNNY's groundbreaking payload platform, which introduced multi-vector USB attacks, has evolved.

Stop hidden attacks or IT automation tasks faster than ever with a single flick of a switch. The new Bash Bunny Mark II goes from plug to pwn in 7 seconds - so when the light turns green, it's a hacked machine.

€177.60
Quick-view

DOMAIN - YOUR VIRTUAL ADDRESS, choose a domain if it is still available.

Secure your place on the high street of the internet and choose from a range of domains for sale. List of all domains sold by us and domains we mediate sales to.

€4,200.00
Quick-view

SHARK JACK cable kah5 - Hotplug attack, meet LAN

As tiny Linux computers, they run DuckyScript™ payloads powered by Bash. Armed out-of-the-box with an ultra-fast network scanner, you'll get recon with the flick of a switch.

€174.00
Quick-view

O.MG Cable - Elite (Early Access) / USB-A / USB-C (White)

The O.MG Cable is a hand made USB cable with an advanced implant hidden inside. It is designed to allow your Red Team to emulate attack scenarios of sophisticated adversaries. Until now, a cable like this would cost $20,000 (ex: COTTONMOUTH-I). 

€298.80
Quick-view

O.MG PROGRAMMER USB A+C

universal O.MG programmer works for O.MG Cable, O.MG Adapter, and O.MG Plug.

€49.00
Quick-view

Flipper Zero multifunctional tool for pentesters and geeks in a toy-like body

Flipper Zero is a portable multi-tool for pentesters and geeks in a toy-like body. He loves exploring digital things like radio protocols, access control systems, hardware and more. It is fully open-source and customizable, so you can extend it in any way you want. More about Flipper Zero

€252.00
Quick-view
LAN MONITORING HAK5 PLUNDER BUG LAN TAP PRO – 956, SMART LAN TAP USB-C LAN MONITORING HAK5 PLUNDER BUG LAN TAP PRO – 956, SMART LAN TAP USB-C
  • Out-of-Stock

LAN MONITORING HAK5 PLUNDER BUG LAN TAP PRO – 956, SMART LAN TAP USB-C

The Plunder Bug by Hak5 is pocket-sized LAN Tap that lets you "bug" Ethernet connections with USB-C convenience.

The latest Hak5 for LAN testing is the first smart cable to connect to LAN Ethernet via usb-c port.

In addition to passive windows, Mac and Linux, Plunder Bug can be used as an active USB Ethernet adapter. This modern version of LAN Tap even has an Android guide app for recording and sharing captured packets on your travels.

€132.00
Quick-view
SCREEN CRAB - The Screen Crab by Hak5 is a stealthy video SCREEN CRAB - The Screen Crab by Hak5 is a stealthy video
  • Out-of-Stock

SCREEN CRAB - The Screen Crab by Hak5 is a stealthy video

This covert inline screen grabber sits between HDMI devices - like a computer and monitor, or console and television - to quietly capture screenshots. Perfect for sysadmins, pentesters and anyone wanting to record what's on a screen.

€334.80
Quick-view