
PC špionáž - monitorovanie PC.
-
KEY-LOGGER GRABBER-873 CEZ WI-FI PREMIUM PS2-2G VER. HARDVER ZAZ
€172.00Devices for capturing (record) keyboard presss connected through a PS2 port. New market 2011 over WiFi network. Hardware memory registers each keyboard stroke in internal memory and can be sent over WiFi devices. Data from this device can later be downloaded and analyzed on a monitored or other computer. All data is protected by 128 bit encryption, no one reads the data without a password.
A computer keyboard spy ing device can work continuously for 12 months and spy on your PC.
-
KEY-LOGGER GRABBER-872 CEZ WI-FI PREMIUM USB-2G VER. HARDVER NA
€175.00Devices for capturing (record) keyboard presss connected through a PS2 port. New market 2011 over WiFi network. Hardware memory registers each keyboard stroke in internal memory and can be sent over WiFi devices. Data from this device can later be downloaded and analyzed on a monitored or other computer. All data is protected by 128 bit encryption, no one reads the data without a password.
A computer keyboard spy ing device can work continuously for 12 months and spy on your PC.
-
WI-FI WEP-755 CRACKER 802.11B/G NASTAVENOU ŠIFROVACOU METÓDOU W
€149.24USB Wi-Fi bezdr tov adaptér vybaven v esmerovou anténou s vysok m ziskom je mo né pou va ako klasick r diov adaptér pre pripojenie k sie am Wi-Fi tandardu 802.11. V spojen s dod van m softvérom je v ak jeho hlavn m poslan m n jdenie hesla akejko vek dostupnej bezdr tovej siete s nastavenou
K takto zabezpe enej r diové sieti sa nie je mo né pripoji" bez znalosti hesla. Pr ve za elom n jdenia tohto ifrovacieho k a boli vyvinuté algoritmy, ktoré vyu vaj slab n kryptovacie met d zabezpe enia WEP. Softvér pou va d myselné kryptografické algoritmy ved ce k prelomeniu WEP ifrovanie a n jdenie ifrovacieho k a a teda aj pr stupového hesla k sieti.
-
COMPUTER KEYBOARD SPY 2GB FLASH PS/2+ACCELERATOR
€89.00Keyboard capture (recording) devices connected via ps2 port. New on the market 2009. The device cannot be used on a USB keyboard through the reduction that is attached. This is only used to read the data. Hardware memory writes every keypad to internal memory. Data from this device can later be downloaded and analyzed on a monitored or other computer. All data is protected by 128 bit encryption, without password data no one reads.
-
KEYLOGGER SPY COMPUTER KEYBOARD AGENT007-USB – 2GB
€99.00Computer Keyboard Spy AGENT007-USB – 2GB (KEY Katcher) PROFI VERSION, It is a small electronic device that is connected between the keyboard and the computer.
Hardware memory writes every punch to the keyboard in internal unproprescribed EEPROM memory. This key spy can later be downloaded and analyzed by our software to decode everything that happened on the PC.
-
KEYLOGGER NANO SPY COMPUTER KEYBOARD AGENT007-USB – 16MB
€103.20Spy computer keyboard micro AGENT007-USB – 16MB (KEY Katcher NANO) PROFI VERSION, only 2.5cm long.
Devices for capturing (record) keyboard presses. The device is micro large, a little smaller memory, but the capacity is absolutely sufficient for 2 months of recording. It is a small electronic device that is connected between the keyboard and the computer.
-
A BLUETOOTH MONITOR OR WIRELESS MONITOR
€324.00AIRcable Host XR Most Powerful CSR BlueCore 04 Chip at AMP
Monitor and monitor bluetooth devices (keyboards, wireless devices to GSM phones, communication between them and analyze them for your needs)
Or just transfer your data via bluetooth over greater distances.
-
PROXMARK III , RFID RESEARCH
€499.00This device can do almost anything involving almost any kind of low (125 kHz) or high (13.56 MHz) frequency RFID tag. It can act as a reader. It can analyze the signal received over the air more closely, for example to perform an attack in which we derive information from the tag's instantaneous power consumption.
It can analyze the signal received through the air, for example, to perform an attack in which we derive information from the tag's instantaneous energy consumption. It can pretend to be a tag itself. It can pretend to make a mark in itself. It is also capable of some less obviously useful operations that might come in handy for development work. It is also capable of some less obviously useful operations that could come in handy for developmentwork.
-
TOUCHATAG STARTER PACKAGE HF RFID READER
€60.00USB HF RFID reader + 10 brands touchatag starting kit, can be used to create your Internet of Things. With touchatag, objects can be intelligent and applications can become available using a simple touch. Usage: From links between your toddler toys to websites to creating or customizing your own loyalty or rental service, the app's touchatag starter package is limited only by your imagination. Content: Touchatag Starter kit includes one USB RFID reader RFID tags and 10 (smart stickers). System requirements: Usb reader works with PC Windows XP and Vista and MacOSX 10.4 or higher (Intel version). Technical: The USB reader operates at 13.56MHz (high frequency RFID) and has a reading distance of about 4 cm (1.5 inches) when used with touchatag RFID tags.
-
KEYSY RFID DUPLICATOR, COPY RFID WITH ONE PRESS 958-20
€116.40It can back up to four RFID key access credentials to a small device in the driver design.
Keysy RFID Duplicator, copy RFID with one push 958-20
Keysy is a new product that can back up to four RFID key access credentials into a small device in driver design. It unites all your RFID on one of your keychains so you can keep the originals at home and you don't have to pay expensive replacement fees if you lose them.
Two simple steps to RFID_Security
-
HIDDEN REMOTE ACCESS AND ANONYMOUS PACKET CAPTURE THE PACKET SQUIRREL
€88.80The multi-purpose hardware is designed to provide you with hidden remote access, painless packet capture, and secure VPN connections using that switch.
Hidden remote access and anonymous packet capture of The Packet Squirrel-957 by Hak5
This Ethernet multi-purpose hardware is designed to provide you with hidden remote access, painless packet capture, and secure VPN connections using that switch.
-
KEYLOGGER SPY COMPUTER KEYBOARD AGENT007-USB – 2GB
€99.60Spy computer keyboard AGENT007-USB – 2GB (KEY Katcher) PROFI VERSION Device for capturing (record) keyboard presses.
It is a small electronic device that is connected between the keyboard and the computer.
Hardware memory writes each keypad stroke into the internal unwritten EEPROM memory. This keyboard spy can later be downloaded and analyzed by our software to decode everything that happened on your PC.
-
LAN MONITORING HAK5 PLUNDER BUG LAN TAP PRO – 956, SMART LAN TAP USB-C
€120.00The Plunder Bug by Hak5 is pocket-sized LAN Tap that lets you "bug" Ethernet connections with USB-C convenience.
The latest Hak5 for LAN testing is the first smart cable to connect to LAN Ethernet via usb-c port.
In addition to passive windows, Mac and Linux, Plunder Bug can be used as an active USB Ethernet adapter. This modern version of LAN Tap even has an Android guide app for recording and sharing captured packets on your travels.
-
GEAR-959 FOR PENETRATION TESTS AND OTHER USES.
€97.20Pocket Network Attack Q3 2019 portable network attack tool is a pentesters best friend optimized for social engineering engagements and opportunistic wired network auditing.
Gear-959 for penetration tests and other uses. This portable network attack tool is Pentester's best friend, optimized for social engineering tasks and occasional wired network audits. It is functional and works with a very fast nmap payload (payload) that allows you to search quickly and easily on a LAN network. Thanks to simple scripting language and attack/activation switch, load load load is a breeze, and RGB LED provides instant feedback on the stages of an attack.
-
USB RUBBER DUCKY DELUXE, HACK PC
€90.00USB Rubber Ducky provides a powerful payload in seconds by readied the benefits of the natural credibility of target computers while deceiving a person by posing as a plain USB drive.
Imagine if you could go to your computer, attach a seemingly innocent USB drive and let it install the back door, exfiltrate documents, steal passwords or any number of favorite tasks.
-
LAN TURTLE IS A HIDDEN SYSTEM ADMINISTRATION SYSTEM AND PENETRATION TEST TOOL
€76.80LAN Turtle is a hidden system administration system and penetration test tool providing secret remote access, network intelligence collection and human surveillance through a simple graphics shell.
With the hidden appearance of the LAN Turtle, which is located in the generic "USB Ethernet Adapter" case, this computer fits into many IT environments.
-
AGENT007-128KB-KLAV MODULE PROFI SPY COMPUTER KEYBOARD.
€77.65Capture (record) keyboard keys. It is a small electronic device that must be plugged (installed) directly into the keyboard or into the computer.
Hardware memory writes each keyboard press to internal unprescribed EEPROM memory. This key spy can be downloaded later ( you change the keyboard for another) and you begin to analyze our software to decode everything that happened on the PC.