By using malicious USBs, it only requires a few seconds to infect an entire network. We felt the need to change that, which is why we created Chernobyl, a fully customizable software and hardware platform that can identify threats before your whole customer database and blueprints are auctioned on a darknet marketplace. We have made this possible by using threat intelligence from the darknet and the very best hardware to create a device that adopts the same tactics, techniques and procedures as the cyber villain’s that want to steal your data and destroy your business. By using Chernobyl, you will be able to find flaws in your system and secure your business before something detrimental happens.
LET'S TALK ABOUT FEATURES
Only your imagination sets the limits for what Chernobyl can accomplish, however we would like to give you some ideas about how it can be configured and showcase its amazing capacities.
Within two seconds Chernobyl will deplete any protection and open a terminal that hides the entire process.
Turns any executable file into a fully legitimate process.
Extract credentials from most applications within 15 seconds, including all browsers.
Pickpocketing for the modern cyber era, unlocks most electronic wallets.
See what's going on the desktop or why not enable the webcam to watch the surroundings?
Recovers detailed information about web browsing history, even in privacy mode.
Wiretapping of VoIP applications, including real-time surveillance options
Super detonation, spreading Chernobyl and infecting all connected computers on a network.
Bye-Bye Anti Virus
Besides by-passing an anti-virus, Chernobyl can also turn off and remove the anti-virus software completely.
Chernobyl can record any keyboard input without any compromises.
FTP delivery? E-mail? No problems, Chernobyl offers many different delivery options.
Multi platform support
Any Windows device, most Linux distributions, many Android devices and limited support for OSX/Unix/IOS.
ENGINEERED FOR PERFORMANCE
The Chernobyl hardware platform is the result of an extraordinary effort by Jiggsoft’s engineers. It is powered by a high performance, low power AVR micro-controller based on advanced RISC architecture. However, the most interesting aspect isn't about its speed, even if the Chernobyl can be configured to use chips up to 400 MHz. The real magic is the USB 2.0 Full-speed/Low Speed Device Module, which enables the Chernobyl to pretend to be a common, inoffensive USB device and adjust the speed of payload execution in line with the target computer.
Weight 9.0 g
It takes an extraordinary factory to build extraordinary products.
Each Chernobyl is assembled by hand in Carlisle, United Kingdom.
We have a four-step approach to meeting our clients’ need
Tell us what you need and we will get back to you promptly
Our team will prepare a device customized to your needs
Upon payment the device will be shipped on same day
We will help you with eventual modifications and updates
Each Chernobyl is a unique product that includes custom software designed to meet your demands, therefore it can only be purchased as part of a consulting contract. Our offer includes everything; from programming the device, to supplying you with updated features and helping you with a strategy to avoid attacks from happening. Our pricing is reasonable, for just 500 £ we can offer you a fully custom designed USB attack platform with basic functionality. Just fill in the form below and one of our specialists will get in touch with you as soon as possible!