2013 LEAKS          2014 LEAKS          2015 LEAKS          2016 LEAKS          2017 LEAKS  
IC off the Record

 

An active 802.11 wireless exploitation and injection tool for
payload/exploit delivery into otherwise denied target space. NIGHTSTAND is
typically used in operations where wired access to the target is not possible.
An active 802.11 wireless exploitation and injection tool for payload/exploit delivery into otherwise denied target space. NIGHTSTAND is typically used in operations where wired access to the target is not possible.

Related:  NIGHTSTAND: NSA Exploit of the Day

 

 

 

Sparrow II is a fully functional WLAN collection system with
integrated Mini PCI slots for added functionality such as GPS and
multiple Wireless Network Interface Cards
An embedded computer system running BLINDDATE tools. Sparrow II is a fully functional WLAN collection system with integrated Mini PCI slots for added functionality such as GPS and multiple Wireless Network Interface Cards

Related:  SPARROW-II: NSA Exploit of the Day

 

 

View More From the Ant Product Catalog: