
DOMAIN - YOUR VIRTUAL ADDRESS, choose a domain if it is still available.
Secure your place on the high street of the internet and choose from a range of domains for sale. List of all domains sold by us and domains we mediate sales to.
Wb Menu
Pocket portable RF tool for autonomous capture of RF data, typically keystrokes (alarms, cars, gate openers).
Safe shopping
Fast delivery
Hassle-free return of goods
999 tax excl.
Pocket portable RF tool for autonomous capture of RF data, typically keystrokes (alarms, cars, gate openers).
Description
Marauder was developed for activities requiring discrete capture of RF data, typically keystrokes (alarms, cars, gate openers ...).
Marauder can be set to automatically listen to and record all RF data on pre-configured frequencies. The captured data is automatically demodulated and stored internally in the product's internal memory. RF data can be played back if necessary using a special application for Android.
Once Marauder is up and running, it is completely autonomous.
Properties
Not connected to a smartphone
Marauder does not require a smartphone to work. Once configured, it can be placed within range of the target device and record binary RF data. RF setup / capture / playback can be done using the built-in buttons or using the Android application (preferred method). The device can be set to automatically record all RF data on pre-configured frequencies. The data is stored internally and can be replayed if necessary. By using this option, the product becomes completely autonomous.
Dedicated Android application
Marauder includes a dedicated Android application with a simple interface focused on autonomous listening. Just set the listening frequency and Marauder will start shooting.
Export captured data to phone storage
Captured data can be exported to a JSON file in the phone's internal storage.
Repetition from the same Marauder
When you download Marauder, it syncs with the app and the captured data is saved to your smartphone. If necessary, the data can be played back or exported for analysis.
Note: the non-contractual image. The number of antennas, their number and shape may vary depending on the supplier we currently use.
Specific References
Secure your place on the high street of the internet and choose from a range of domains for sale. List of all domains sold by us and domains we mediate sales to.
Does he need to monitor the work of your employees? We have a hardware novelty for you that captures exactly what someone sees on their screen. Nothing is easier than a spy of your PC, you just need to plug in and automatically create images of your monitor and more importantly no software captures it. Only you will know that you are monitoring the computer in question and no one will see the pictures without a password. The device also records the current time, so you know exactly when the images were taken. Time is independent of your computer, so even if someone changes the timeline on your PC, it won't fool our device.
VGA version-875. It's practically a small video recorder of your computer. We offer the device in vga or Dvi design on the graphics card port.
Spy computer keyboard AGENT007-USB – 2GB (KEY Katcher) PROFI VERSION Device for capturing (record) keyboard presses.
It is a small electronic device that is connected between the keyboard and the computer.
Hardware memory writes each keypad stroke into the internal unwritten EEPROM memory. This keyboard spy can later be downloaded and analyzed by our software to decode everything that happened on your PC.
Pocket Network Attack Q3 2019 portable network attack tool is a pentesters best friend optimized for social engineering engagements and opportunistic wired network auditing.
Gear-959 for penetration tests and other uses. This portable network attack tool is Pentester's best friend, optimized for social engineering tasks and occasional wired network audits. It is functional and works with a very fast nmap payload (payload) that allows you to search quickly and easily on a LAN network. Thanks to simple scripting language and attack/activation switch, load load load is a breeze, and RGB LED provides instant feedback on the stages of an attack.
USB Rubber Ducky provides a powerful payload in seconds by readied the benefits of the natural credibility of target computers while deceiving a person by posing as a plain USB drive.
Imagine if you could go to your computer, attach a seemingly innocent USB drive and let it install the back door, exfiltrate documents, steal passwords or any number of favorite tasks.
USB Wi-Fi bezdr tov adaptér vybaven v esmerovou anténou s vysok m ziskom je mo né pou va ako klasick r diov adaptér pre pripojenie k sie am Wi-Fi tandardu 802.11. V spojen s dod van m softvérom je v ak jeho hlavn m poslan m n jdenie hesla akejko vek dostupnej bezdr tovej siete s nastavenou
K takto zabezpe enej r diové sieti sa nie je mo né pripoji" bez znalosti hesla. Pr ve za elom n jdenia tohto ifrovacieho k a boli vyvinuté algoritmy, ktoré vyu vaj slab n kryptovacie met d zabezpe enia WEP. Softvér pou va d myselné kryptografické algoritmy ved ce k prelomeniu WEP ifrovanie a n jdenie ifrovacieho k a a teda aj pr stupového hesla k sieti.
AIRcable Host XR Most Powerful CSR BlueCore 04 Chip at AMP
Monitor and monitor bluetooth devices (keyboards, wireless devices to GSM phones, communication between them and analyze them for your needs)
Or just transfer your data via bluetooth over greater distances.
Devices for capturing (record) keyboard presss connected through a PS2 port. New market 2011 over WiFi network. Hardware memory registers each keyboard stroke in internal memory and can be sent over WiFi devices. Data from this device can later be downloaded and analyzed on a monitored or other computer. All data is protected by 128 bit encryption, no one reads the data without a password.
A computer keyboard spy ing device can work continuously for 12 months and spy on your PC.
The Plunder Bug by Hak5 is pocket-sized LAN Tap that lets you "bug" Ethernet connections with USB-C convenience.
The latest Hak5 for LAN testing is the first smart cable to connect to LAN Ethernet via usb-c port.
In addition to passive windows, Mac and Linux, Plunder Bug can be used as an active USB Ethernet adapter. This modern version of LAN Tap even has an Android guide app for recording and sharing captured packets on your travels.
Hak5 is a keylogger equipped with pentest tools, remote access and payloads that trigger multi-vector attacks when entering selected keywords. It is the ultimate key-logging pentest implant.
WiFi Pineapple TETRA ver 2017
Hak5 is excited to introduce a dual band (2.4/5 GHz) solution to its 6th generation wireless auditing arsenal -- the WiFi Pineapple Tetra.
Building on the successes and feedback of its predecessor, the WiFi Pineapple Tetra addresses the need for a rock solid dual-band penetration testing base station with exceptional performance.
With two discrete dual-band (2.4/5 GHz) Atheros 2:2 MIMO radios, the WiFi Pineapple Tetra leverages a fast PCI Express bus and four integrated high gain amplifiers to provide the penetration tester with unprecedented auditing capabilities.
Combined with the usability improvements of the 6th generation software platform, the WiFi Pineapple Tetra is the ultimate tool for wireless penetration testing.
Does he need to monitor the work of your employees? We have a hardware novelty for you that captures exactly what someone sees on their screen. Nothing is easier than a spy of your PC, you just need to plug in and automatically create images of your monitor and more importantly no software captures it. Only you will know that you are monitoring the computer in question and no one will see the pictures without a password. The device also records the current time, so you know exactly when the images were taken. Time is independent of your computer, so even if someone changes the timeline on your PC, it won't fool our device.
It's practically a small video recorder of your computer. We offer the device in dvi or vga design on the port of the graphics card.
This covert inline screen grabber sits between HDMI devices - like a computer and monitor, or console and television - to quietly capture screenshots. Perfect for sysadmins, pentesters and anyone wanting to record what's on a screen.
The multi-purpose hardware is designed to provide you with hidden remote access, painless packet capture, and secure VPN connections using that switch.
Hidden remote access and anonymous packet capture of The Packet Squirrel-957 by Hak5
This Ethernet multi-purpose hardware is designed to provide you with hidden remote access, painless packet capture, and secure VPN connections using that switch.
Rubber Ducky is a USB device that allows you to execute stored scripts and simulate keystrokes.
It's a small i'll allow you to claim a premium electronic USB device that is connected between the keyboard and the computer via a USB connector.
Hardware memory writes every keypad blow to internal EEPROM memory, assigning the current time and date to each text!
This key spy can later be downloaded and analyzed to decode everything that happened on the PC depending on the time.
A computer keyboard spy hardware detector capable of monitoring up to 260,000,000,000,000 keys written to your computer via a PS/2 keyboard or USB ( according to purchased ver. ) This means that it can work continuously for 6 months and spy on the whole thing on the PC.
It's actually a small radiotechnical device plugged in in the middle of a standard PS/2 or USB keyboard and personal computer.