Ikeriri Cyber Security Penetration Test Equipment Sales Information + Penetration test equipment sales Service details Ikeriri Network Service handles penetration testing equipment from the American company Hak5 and others. Many penetration testing devices, including Hak5, do not have an official distributor system. However, we believe that there are many customers who are unable to purchase from American companies or pay by credit card. The penetration testing equipment we sell is purchased and sold on behalf of the Self-Defense Forces, prefectural police, universities, and companies based on quotations and invoices. Therefore, the selling price and time may be higher than Hak5's list price. As a general rule, we do not accept transactions with individual customers for this equipment. *The penetration testing equipment we sell is a device used to learn about attacks and countermeasures on a practical network for system protection education.Actually, attacks or hacking on the external Internet violates the Unauthorized Access Act, as well as criminal and civil laws, and may be punished. Example of Hak5 penetration testing product WiFi Pineapple MarkVII |
||
![]() |
Main specifications |
Main functions (common to NANO/TETRA) packet capture Access point search Discovery of vulnerable devices Frame insertion attacks (Deauth, etc.) Creating a rogue AP WPA2/3 (PSK/Enterprise) attack MAC/SSID filter Web interface Cloud management compatible C2 |
WiFi Pineapple MarkVII ENTERPRIZE (Currently not on sale) |
||
![]() |
Main specifications |
![]() |
| USB Rubber Ducky USB Rubber Ducky is a USB memory-type penetration testing device that can perform keystroke insertion attacks. It can be programmed using a dedicated Ducky Script and can also be used as an RPA tool. |
||
![]() |
Main specifications USB Type A interface 60MHz 32-bit CPU Micro SD slot Payload replay button disassembly case |
Main features keystroke insertion attack Programming with Ducky Script Numerous payloads available (password capture, security information dump, etc.) |
Bash Bunny |
||
![]() |
Main specifications |
Main features Multiple payloads (data acquisition, backdoors, system intrusion) Can handle multiple devices virtually Ducky Script compatible nmap metasploit can be called keystroke insertion attack |
| Packet Squirrel Packet Squirrel is a pocket-sized Ethernet MITM penetration testing device. Equipped with a variety of open source Ethernet tools, you can operate remote access, packet capture, VPN connectivity, and more from the switch. |
||
![]() |
Main specifications |
Main features MITM attack packet capture Tunnel NAT processing with Open VPN DNS spoofing attack Supports capacity expansion with USB storage Ducky Script compatible NAT, VPN, etc. Cloud management compatible C2 |
LAN Turtle |
||
![]() |
Main specifications |
Main features Packet Capture Spoofing VPN NAT Check and select to configure and execute main modules (nmap/openvpn/ptunnel/dns-spoof/meterpreter etc.) Cloud management compatible C2 |
| PLUNDER BUG LAN TAP Plunder Bug LAN TAP is a simple inline LAN tap with USB-C connection. Compatible with Windows/Mac/Linux, it can be used as an inline connection or as a regular USB-C Ethernet adapter. |
||
![]() |
Main specifications 10/100BASE-T FastEthernet ASIX AX88772C chipset USB-C tap and power Compatible with Android (root required) Compatible with Windows/Mac/Linux |
Main features Packet capture with inline connection (via USB-C) Can also function as a standalone USB-C Ethernet adapter |
SIGNAL OWL |
||
![]() |
Main specifications |
Main features Wireless LAN capture Access point detection Supports aircrack-ng, MDK4, Kismet and other open source tools Expand by connecting WiFi/GPS/SDR/Bluetooth adapters Cloud management compatible C2 |
SCREEN CRAB |
||
![]() |
Main specifications |
Main features HDMI (FullHD 1080p) video capture and screenshots Supports MicroSD (SDXC) for long-term recording Storage rotation support Online streaming compatible Cloud management C2 |
SHARK JACK |
||
![]() |
Main specifications |
Main features Investigating the network with nmap (simple version) Executing tests using scripting functionality Connect and charge with PC via built-in storage and USB-C Cloud management C2 |
KEY CROC |
||
![]() |
Main specifications |
Main features Keystroke logging New/old detection avoidance function using hardware ID clone keystroke insertion attack Connect via built-in WiFi Payloads that can be pattern matched in a Ducky scripting environment USB Virtual Ethernet Cloud Management C2 |
O.MG CABLE |
||
![]() |
Main specifications |
![]() |
Please inquire about other products. |
||
|
||
SDR Security Analysis Tools
SDR-based cybersecurity analysis tools and related services.
















