HACKCUBE


HackCube is a totally new way for organizations to perform penetration tests, designed to meet all security testing requirements of organizations that operates globally, whenever you have your operations in Stockholm or Gibraltar. Once plugged into your network it will enable our security specialists to remotely access your network and perform tests at very low costs. The HackCube can also be configured to run automated scripts to ensure that your security keeps up with the latest standards and ensures the safety of your organization.

HackCube

Detect Vulnerabilities

Pre-loaded with a complete set of world-leading tools for penetration testing.


Prevent Attacks

Constantly monitoring your security and running automatic tests.


Virtual CISO

Cyber security specialist team on demand perfectly aligned for your needs.


Open Source

The HackCube combines open source software and an advanced ARM platform.

In the HackCube, we have squeezed the most possible computer into the least possible space. The HackCube comes equipped with a quad-core ARM processor running at 1.5 ghz, 1 gb of ram, integrated Wifi, Bluetooth and 100 Base Ethernet, HDMI, 4 USB ports and full support for GPIO expansion. The open source linux distro that's installed, offers over 100 pre-installed pro-offensive tools for cracking wifi, network scanning, attack payloads but also tools for analyzing your network traffic and identify possible vulnerabilities.

Since we founded Jiggsoft, we have understood the strength of our software in offensive security testing, law enforcement and intelligence investigations. We also have established the potential for abuse of the surveillance technologies that we produce, hence take a number of precautions to limit the potential for misuse. We provide our software only to businesses with legitimate use, such as offensive security testing and governed agencies. We do not promote sale of Chernobyl or related products to individuals and expect private owned businesses to have legitimate use of the product. We do not engage ourselves in the sale of products to sources and firms in countries blacklisted by the U.S., E.U., U.N., NATO or ASIA. We review potential customers before marketing to determine whether or not there is objective evidence or credible interest that Jiggsoft technology issued to the customer. A process used to enforce the protection of human rights violations. We fully comply with dual use and export controls called for in the nineteenth plenary meeting of the Wassenaar Arrangement. Jiggsoft policies and procedures are consistent with the international Know Your Customer guidelines. Despite the stricty rules, it's a simpler process than opening a bank account. For most potiential customers we will ask for a scanned copy of your ID and your business registration certicate, our staff will later take certain messures to confirm that it is correct, if we can't confirm the information we will ask you to provide notarized copy of relevant documents with an apostille to confirm that everything is OK.