Skip to content

The kit you bring to authorized engagements

HID hardware, OSINT, Proxy, firmware, and the Companion app — sold separately, designed to compose. Hand-built in Germany, runs offline, no subscriptions on the core.

The work

Five steps of an authorized engagement

Same shape every engagement. Tools change, scope changes, scope-letter changes — the workflow doesn’t.

01

Recon

Pull the public picture before you touch the target. Build an investigation profile you can hand to an analyst.

OSINT · Proxy

02

Plan

Convert recon into authorized scope. Write the script library you'll use day-of in the Companion app.

Companion · Profiles

03

Execute

HID handles the physical-access leg, OSINT runs intelligence, Proxy chains the network leg. Offline-capable.

Ghost · Mini · Firmware

04

Validate

Chain leak checks, confirm exposure, verify findings against scope. Cross-tool pivots in the same profile.

Proxy · OSINT

05

Hand off

Investigation profile exports to PDF. Procurement-friendly EULA addendum and authorized-testing template ride along.

PDF export

What working pros buy

The professional kit

Most freelance pentesters and small red teams end up with the same combination.

ZeroTrace Ghost

Flagship HID device — physical-access leg

View product

HID firmware

Web UI · multi-script · BLE + Wi-Fi controlled

View product

OSINT toolkit

70+ tools · investigation profiles · PDF export

View product

Proxy suite

Extraction · leak testing · chain & rotation

View product
Why this stack

What you actually buy

Three things that hold across every product in the kit.

Tools you own

One purchase, lifetime updates, no cloud account that has to be alive for the device to work. Same kit in five years.

No-log by default

Customer operational data — testing activity, OSINT queries, payloads — never leaves your machine.

Procurement-ready

Plain-language EULA addendum, authorized-testing template, single-PO invoicing. No follow-up emails.

Ready for the next engagement?

Start with one device. Add what fits the next engagement. Same trust model at every scale.

Command Palette

Search for a command to run...