top of page
Web Consultation

Security Products

Our goal is to help protect individuals and small businesses from the ever growing and frightening arena of digital threats.  Our clients seek greater security, privacy and control of their personal information and assets.  We provide solutions to protect them from cyber crimes, data loss and theft of intellectual property via Device Protection, Network Security, Private Email and VPN services.

 

Our products are used to test the strength of networks and to detect external interference.  We understand the need to have good tools and gear. 

​

Note:  Due to chip shortages and shipping delays worldwide, orders may take up to two weeks to ship. 

 

Our product line is expanding, so check back often to see what's new. If you have a specific request for a product or feature please let us know.

rfid-duplicator.png

RFID Duplicator - $75

 

The Keysy is a pocket-sized device for copying and emulating Low Frequency (125KHz) RFID tags. The device can hold four LF tags, which can be written off the device at a later time onto the Keysy LF tags.

​

Tag reading is simple and takes 20-30 seconds – place the device on top of the target badge, press a few buttons and it will be saved to the button slot you pushed. Tags can be immediately emulated / replayed or written out onto a physical badge.

​

The Keysy is another solid RFID tool for penetration testers. Also ideal for making spare RFID tags for your home or office.

malicious-cable-detector.png

Malicious USB Cable Detector - $55

​

The Malicious Cable Detector will detect malicious cables and block data while charging. Just plug the cable into the detector, then the detector into your computer's USB port. LED activity indicator lets you know if the cable is safe.

man-in-middle-tool.png

Miniature Man-in-the-Middle Tool - $175

(with 128GB USB drive included)

 

A tiny 2 inch across man-in-the-middle Ethernet device designed to give you covert remote access, easy packet captures, and secure OpenVPN connections with the flip of a switch. Captures packets between any network endpoint. Save standard .pcap files to ordinary USB flash drives for later analysis with open source tools like Wireshark.

hackrf-portamack-havoc.png

HackRF1 Portapack and Mayhem Firmware - $400

 

Software defined radio device that can detect, record, transmit, play back scan and analyze virtually all radio frequencies. The Mayhem firmware provides many specialized features not available on the standard HackRF device.

 

Caution: if you use this device, make sure you understand how it works and what frequencies and types of emissions are legal for you to record and or transmit in your area.

rfid-kill.png

NFC Kill RFID Killer - $250

​

 

​

Securely disable RFID badges.

Test and harden RFID hardware

Audit access control failure modes

Test and reduce the attack surface for pen-test customers

Single Discharge Mode

Continuous Discharge Mode

usb-kill.png

USBKill V4 Kit - $225

 

The Pro kit is designed for individual users or small business, and contain the USBKill of your choice, basic adapters, tester, accessories and a tool-case.
 

Over the last five years since the USBKill 1.0 was released, the USBKill has been deployed in thousands of tests in dozens of industries. In-Flight Entertainment systems have been tested and secured against malicious attacks. Life-critical medical systems have been rigorously tested to ensure they are hardened against Power Surge Attacks. Dozens of electronic locks and access control systems have had their "open on system failure" modes confirmed.

 

Pentesters and law-enforcement regularly deploy USBKill as part of their testing and intervention scenarios.

usb-ninja.png

USB Ninja Cable - $125

 

USB Ninja is an information security and penetration testing tool that looks and functions just like a regular USB cable (both power and data) until a wireless remote control triggers it to deliver your choice of attack payload to the host machine.

​

Emulating keyboard and mouse actions, payloads can be completely customized and can be highly targeted. Undetectable by firewalls, AV software (**depending on payload of course**) or visual inspection, the USB Ninja is an ideal tool for penetration testers, police and government.

​

Includes: 1 cable type of choice and 1 trigger/programming ring.

LanTap.png

LAN Tap - $30

 

The LAN Tap is a passive Ethernet tap, requiring no power for operation. There are active methods of tapping Ethernet connections but none can beat passive taps for portability. To the target network, the LAN Tap looks just like a section of cable, but the wires in the cable extend to the monitoring ports in addition to connecting one target port to the other.

​

The monitoring ports (J3 and J4) are receive-only; they connect to the receive data lines on the monitoring station but do not connect to the station’s transmit lines. This makes it impossible for the monitoring station to accidentally transmit data packets onto the target network.

UHFKill.png

NFCKill UHF - $1800 (Special Order)

 

Wirelessly disable UHF RFID tags

UHF tag destruction is difficult for multiple reasons:

Antenna shapes make induction more difficult
Antenna configuration makes high-current induction difficult
Tag orientation is more important - tags have to be in the induction plane, but are often embedded within products (clothes, shoes, devices, etc) in an unknown configuration.

Destruction of UHF tags embedded in shoes
Destruction of UHF tags embedded in clothes
Destruction of UHF tags embedded in industrial products
Disabling RFID tags where tag password is unknown
Disabling UHF tracking tags embedded to control brand and limit item resale.

keygrabber.png

KeyGrabber - $100

 

A physical hardware keylogger that iscompletely transparent from computer operation, and no software or drivers are required. International keyboard layouts are also supported.

​

Contains a module for sending keystrokes via wireless so you don’t need full physical access again and can obtain keystrokes immediately via TCP direct stream or have keystrokes sent to you via email.

bottom of page