Main view
search
  • Main view
ID: 1189099
zł829.00
Tax included

zł673.98 tax excl.

An advanced keylogger equipped with penetration testing tools, remote access and a function that triggers attacks after entering specific keywords. It has a built-in USB Type-A port and emulates devices such as serial port, storage, HID and Ethernet. Hak5 KEY CROC

Delivery date unknown
Out-of-Stock

 

Free shipping

free shipping in Poland for all orders over 500 PLN

 

Same day shipping

If your payment will be credited to our account by 11:00

 

14 days for return

Each consumer can return the purchased goods within 14 days

Description

The Key Croc is an advanced keylogger that goes beyond just logging keystrokes - it's equipped with tools for penetration testing, remote access, and a feature triggering attacks upon typing specific keywords. It emulates devices such as serial port, mass storage, HID, and Ethernet, opening up many attack possibilities, from injecting keystrokes to taking over networks.

p1189099-payload-until_800x.png

The device allows triggering attacks when the user types text matching a pattern - from a simple keyword to an advanced regular expression - even if the target makes a typo and presses the Backspace key. It enables logging the number of keystrokes and using these keystrokes in a Cloud C2 notification or actively against the target in an advanced attack. This can be used to capture keystrokes pressed after a lock screen shortcut, such as [CTRL-ALT-DELETE] or [CTRL-CMD-Q], and then using the captured credentials to automatically trigger silent network filtering.

By emulating trusted devices like serial port, mass storage, HID, and Ethernet, the Key Croc allows for many attack possibilities - from keystroke injection to network takeover. The hidden button allows switching to a flash drive, enabling customization of settings through text file editing. Additionally, with root shell access, your favorite penetration testing tools such as nmap, responder, impacket, and metasploit are available. High performance is ensured by the quad-core 1.2 GHz ARM processor and SSD.

p1189099-key-croc-diagram1_800x.png
p1189099-key-croc-cloud-c2_800x.png

Testing of devices is available from anywhere thanks to the online feature that utilizes a free, self-hosted Cloud C2 server. This allows real-time observation of keystrokes. You can also live-enter your own keystrokes, manage attacks, and even get root shell access for advanced attacks directly from your web browser.

The Key Croc requires no configuration and is ready to log keystrokes immediately out of the box. Activating payloads and configuring settings such as Wi-Fi and SSH is simple and only requires editing a text file. This product provides a comprehensive solution for effective threat identification and management, as well as security system testing.

Features

  • Plug and Play - no configuration required
  • Cloud C2 function for browser-based management
  • Undetectable due to automatic cloning of connected keyboard's hardware identifiers
  • Function switching to flash drive via hidden button
  • RGB LED indicators for status signaling
  • Ducky Script 2.0 keyboard emulation function
  • Direct network access through USB Ethernet emulation
  • Quad-core 1.2 GHz ARM processor and 8 GB SSD
  • Debian system access with root privileges
  • 2.4 GHz WiFi module with integrated antenna
  • Input connector: USB type A socket
  • Output connector: USB type A plug
1189099

You might also like

Other products in the same category (16)