The Shark Jack by Hak5

A portable network attack and automation tool for pentesters and systems administrators designed to enable social engineering engagements and opportunistic wired network auditing.

This documentation covers the basics of operation and deployment, accessing the Linux shell for advanced operations, Internet connectivity, software updates and payload development.

The e-book PDF generated by this document may not format correctly on all devices. For the most-to-date version, please see

Last updated