Home>mall>Electronics
0An Fi So

DSTIKE Deauther Watch Z ESP8266 Atmega32u4 Programmable Hacker Watch 1000mAh 80-100m Range USB-C 9-10h Work Time

4.5
★★★★★
138
$84.99 /$103.69
  • *Name:

  • *Email:

  • *Phone:

  • *Quantity:

  • *Content:

  • Attachment:

    Supports JPG, JPEG, PNG, PDF, EXCEL, WORD, RAR, ZIP, 7z formats

$70.99 /$103.69

Tabbacin Biyan Kuɗi lafiya

Kyauta Kyauta
Kyauta kyauta tare da kowane siyayya
Manufar Jigilar Kaya
Jigilar kaya kyauta akan odar sama da $9.9
Manufar Komawa
Ana karɓar abubuwan da aka dawo da su cikin kwanaki 40 tun ranar karɓar kayan. Ba za a iya mayar da abubuwan da aka keɓance ba. Abubuwan da aka saya tare da katin kyauta ana iya musayar su kawai.

Kyauta Kyauta

Barka da zuwa Roymall, shafinku na siyan kyaututtuka masu inganci. Muna girmama goyon bayanku, kuma muna ba da kyauta kyauta tare da kowane siyayya. Shirya don bincika tarinmu kuma ku sami kyaututtukanku masu dacewa.

Manufar Jigilar Kaya

Za mu aika kayanku cikin kwanaki 2 bayan siyayya.Lokacin jigilar kaya yawanci kwanaki 5-7 ne.Saboda jigilar mu ta duniya ne, lokacin jigilar zai dogara da wurin ku.

1. Manufar Komawa

Muna karɓar abubuwan da aka saya daga roymall.com kawai. Ba za a iya mayar da kyauta kyauta ba. Dole ne abu ya kasance ba a yi amfani da shi ba kuma a cikin yanayin da kuka karɓa.Za mu sarrafa komawar ku cikin kwanaki 3-5 bayan karɓa.Ba za a iya mayar da abubuwan da aka keɓance ba.Tuntuɓi mu. service@roymall.com ko Whatsapp: +8619359849471

2.Manufar Maida Kuɗi

Za ku sami cikakken maida kuɗi bayan mu karɓi abubuwan da aka dawo. Kuɗin jigilar kaya ba za a iya mayar da su ba.Tuntuɓi mu. service@roymall.com ko Whatsapp: +8619359849471

Specifications:

Model: DSTIKE Deauther Watch Z

Battery: 1000mAh

Antenna Range: 80-100 meters

Color: Black

USB: USB-C

Buzzer: No

Work Time: 9-10 hours

Weight: 99g

Dimensions: 80 x 70 x 25 mm

Package Included:

1 x Deauther Watch Z

1 x Type-C Power Cable

1 x Acrylic Cover Board

1 x Software Manual

What is it?

It is a hacker watch.You can attempt deauther attacks and bad USB attacks on this watch. emember, this is just a learning platform. All the source code is on the SD card. You can visit deauther.com to learn about deauther, visit ha5.org to learn about ducky script.

Why did you make it?

The old model requires the buyer to program Arduinos themselves to execute a Bad USB attack. The new model does not require the buyer to download and install Arduinos. The buyer only needs to modify the script in the txt file.

Disclaimer

This project serves as a proof of concept for testing and educational purposes. It is important to note that neither the ESP8266 nor its SDK were intended or developed for such purposes. As a result, bugs may occur. Please ensure that you only use this project against your own networks and devices. Prior to usage, it is essential to review and comply with the legal regulations pertaining to your country. We do not accept any responsibility for any actions taken with this program.

More Info:

Deauth

The deauthentication feature is designed to close the connection of WiFi devices by sending deauthentication frames to the selected access points and client devices. It"s important to note that this attack is only possible because many devices do not implement the 802.11w-2009 standard, which provides protection against such attacks.

To ensure proper usage, please select only one target at a time. If you select multiple targets running on different channels and initiate the attack, the system will rapidly switch between those channels, making it difficult to reconnect to the access point hosting the web interface.

Beacon

Beacon packets are used to advertise access points. By continuously sending beacon packets out, it will look like you created new WiFi networks. You can specify the network names under SSIDs.

Probe

Probe requests are sent by client devices to ask if a known network is nearby. Use this attack to confuse WiFi trackers by asking for networks that you specified in the SSID list. It"s unlikely you will see any impact by this attack with your home network.

Bad USB

A HID (Human Interface Device) attack is a type of cyberattack that leverages a device, usually designed to mimic a keyboard or mouse, to exploit vulnerabilities in a computer system or network. This attack method takes advantage of the fact that most computer systems inherently trust input from HID devices, such as keyboards and mice.


DSTIKE Deauther Watch Z ESP8266 Atmega32u4 Programmable Hacker Watch 1000mAh 80-100m Range USB-C 9-10h Work Time

DSTIKE Deauther Watch Z ESP8266 Atmega32u4 Programmable Hacker Watch 1000mAh 80-100m Range USB-C 9-10h Work Time

DSTIKE Deauther Watch Z ESP8266 Atmega32u4 Programmable Hacker Watch 1000mAh 80-100m Range USB-C 9-10h Work Time

DSTIKE Deauther Watch Z ESP8266 Atmega32u4 Programmable Hacker Watch 1000mAh 80-100m Range USB-C 9-10h Work Time

DSTIKE Deauther Watch Z ESP8266 Atmega32u4 Programmable Hacker Watch 1000mAh 80-100m Range USB-C 9-10h Work Time

Cart Dina Cart (20)
Abubuwan Da Nake So Abubuwan Da Nake So (0)