Welcome to the Hak5 Documentation Center
A portable network attack and automation tool for pentesters and systems administrators designed to enable social eng...
A simple payload-based signals intelligence platform with a unique design for discreet planting or mobile operations ...
A stealthy video man-in-the-middle that captures screenshots or videos to disk and streams live to the Internet for r...
The WiFi Pineapple lets pentesters perform targeted man-in-the-middle attacks, advanced reconnaissance, credential ha...
USB Rubber Ducky
The USB Rubber Ducky is a keystroke injection tool disguised as a generic flash drive. Computers recognize it as a re...
By emulating combinations of trusted USB devices — like gigabit Ethernet, serial, flash storage and keyboards — the B...
The Packet Squirrel by Hak5 is a stealthy pocket-sized man-in-the-middle. This Ethernet multi-tool is designed to giv...
USB Ethernet adapters with covert backdoors. These seemingly innocent USB Ethernet adapters are discreet remote acces...
The Plunder Bug by Hak5 is pocket-sized LAN Tap that lets you "bug" Ethernet connections with USB-C convenience.
Cloud C² makes it easy for pen testers and IT security teams to deploy and manage fleets of Hak5 gear from a simple c...