Hak5 - Key Croc
The Key Croc by Hak5 is a powerful keylogger with pentesting tools, remote access, and payloads that trigger multi-vector attacks on specific keyword inputs. It goes beyond simple keylogging, exploiting targets with automated payloads. By emulating trusted devices—serial, storage, HID, and Ethernet—it enables keystroke injection and network hijacking. Capture credentials and exfiltrate data seamlessly or perform pentesting remotely via Cloud C2. A hidden button allows easy transformation into a flash drive, and modifying settings is as simple as editing a text file. With a root shell, tools like nmap, responder, impacket, and metasploit are readily accessible.
The Key Croc by Hak5 is a powerful keylogger with pentesting tools, remote access, and payloads that trigger multi-vector attacks on specific keyword inputs. It goes beyond simple keylogging, exploiting targets with automated payloads. By emulating trusted devices—serial, storage, HID, and Ethernet—it enables keystroke injection and network hijacking. Capture credentials and exfiltrate data seamlessly or perform pentesting remotely via Cloud C2. A hidden button allows easy transformation into a flash drive, and modifying settings is as simple as editing a text file. With a root shell, tools like nmap, responder, impacket, and metasploit are readily accessible.
The Key Croc by Hak5 is a powerful keylogger with pentesting tools, remote access, and payloads that trigger multi-vector attacks on specific keyword inputs. It goes beyond simple keylogging, exploiting targets with automated payloads. By emulating trusted devices—serial, storage, HID, and Ethernet—it enables keystroke injection and network hijacking. Capture credentials and exfiltrate data seamlessly or perform pentesting remotely via Cloud C2. A hidden button allows easy transformation into a flash drive, and modifying settings is as simple as editing a text file. With a root shell, tools like nmap, responder, impacket, and metasploit are readily accessible.