HAK5 Plunder Bug

145.00 $ ex-VAT

HAK5 Plunder Bug is a passive LAN tap for stealthy packet capture and network analysis—compact, USB-C powered, and available now in Lebanon.

Description

HAK5 Plunder Bug – Network Tap for Pentesters

The HAK5 Plunder Bug is a compact, stealthy LAN tap and passive network sniffing tool designed for professional penetration testers, red teamers, and cybersecurity researchers. It enables transparent inline monitoring of Ethernet traffic, allowing for effective packet capture and reconnaissance without detection.

Key Features:

  • Passive Gigabit Network Tap – Silently intercepts traffic between two Ethernet devices with no disruption or packet loss
  • USB-C Interface – Connects to computers, Android devices, or Raspberry Pi for immediate packet capture
  • Supports Mobile & Embedded Use – Ideal for covert field operations and portable assessment kits
  • Compatible with Wireshark, tcpdump, and other tools – Works seamlessly with popular packet analysis software
  • Plug-and-play simplicity – No drivers required on most Linux and Android systems

Specifications:

  • Tap Type: Passive Ethernet bridge
  • Ports: 2 × RJ45 (10/100/1000 Mbps), 1 × USB-C
  • OS Compatibility: Linux, macOS, Android (via OTG), Raspberry Pi
  • Power: USB-C powered
  • Dimensions: Approx. 50 mm × 20 mm

The Plunder Bug is engineered for silent interception of Ethernet traffic without leaving a footprint. Its ultra-compact form factor makes it an ideal companion for mobile red teaming, forensic analysis, and bug bounty engagements.

In stock and ready for fast shipping across Lebanon—equip your toolkit with the trusted HAK5 Plunder Bug.