HAK5
Pentesting & Red Team Gear
root@hak5:~$ ls /tools/
🐰
Bash Bunny
Multi-vector USB attack platform. Emulates trusted devices to deploy payloads in seconds.
// USB ATTACK
🐊
Key Croc
Keylogger armed with pentest tools. Triggers payloads based on typed keywords.
// KEYLOGGER
⚡
O.MG
Covert implant disguised as a cable. Remote access, keystroke injection, and exfiltration.
// IMPLANT
🐿️
Packet Squirrel
Stealthy man-in-the-middle tool. Capture, modify, and inspect network traffic inline.
// NETWORK TAP
🐛
Plunder Bug
Ethernet tap for passive network reconnaissance. Sniff traffic without disruption.
// ETHERNET TAP
🦆
Rubber Ducky
The original USB keystroke injection tool. Executes payloads at over 1000 words per minute.
// HID ATTACK
🦀
Screen Crab
HDMI man-in-the-middle screen grabber. Capture and stream video output covertly.
// VIDEO CAPTURE
🦈
Shark Jack
Portable network attack tool. Automate recon and exploitation on wired networks.
// NETWORK ATTACK
📟
WiFi Pager
Wireless deauthentication and monitoring. Stay informed about nearby network activity.
// WIFI MONITOR
🍍
WiFi Pineapple
Enterprise wireless auditing platform. Rogue AP, MITM, and WiFi reconnaissance.
// WIFI AUDIT