WARNING: SPOILERS
| Software | Purpose | Episode(s) |
|---|---|---|
| american fuzzy lop | fuzzing tool | |
| Anyterm | remote access to consoles through browsers | |
| Apache Struts | MVC framework to develop web applications | |
| Apache Tomcat | Java web server | |
| Beta Bot | Botnet command and control software | S3E9 |
| bluesniff | Bluetooth hacking tool | |
| cloacked-pixel | Steganography detection tool | S3E10 |
| CURL | interact with internet sites in the command line | |
| Cygwin | Linux tools compiled for Windows | S3E2 |
| ELK Stack | Monitoring combining Elasticsearch, Logstash, Kibana | S3E5 |
| FlexiSpy | phone spying software | |
| htop | Linux process monitor | |
| IDA Pro | reverse engineering | S3E2 |
| iodine | tunnel IPv4 through DNS | S3E9 |
| Kali Linux | Hacking Linux distribution | |
| Kibana | Monitoring | S3E5 |
| Linux Mint | Desktop Linux distribution | S3E9 |
| Logstash | Log collection tool | S3E5 |
| LUKS | Linux encryption software | S3E10 |
| Meterpreter | Metasploit remote exploit shell execution | |
| OpenWRT | Linux on routers | |
| osTicket | Ticket system | S1E8 |
| Outlook Web Access | web client for Microsoft Office Exchange/Outlook | S3E2 |
| PuTTY | shell access client | S3E5 |
| PyCharm | Python IDE | S1E4 |
| PyLyrics | Python script to download lyrics | S3E10 |
| Pwnix | Android distribution for hacking | S2E9 |
| radare | Reverse Engineering | S2E12 |
| rkhunter | Rootkit checker | S3E2 |
| scp | copy files over the network | |
| Social Engineer Toolkit | tools for attacks against humans | |
| Shodan | Vulnerability Search Engine | S3E1 |
| SSH | remote shell access | |
| Thunderbird | mail program | S1E9 |
| TOR | Anonymised network | S2E7 |
| Ubuntu Kylin | Chinese version of Ubuntu Linux | S3E9 |
| vim | text editor | |
| Volatility Framework | memory forensics | S3E9 |
| wifite | WLAN hacking tool | |
| Wickr | phone messaging application with self destroying messages | |
| Xpdf | pdf viewer for Linux/Unix | S3E10 |
| xxd | Hex dump software | S3E10 |
see also:
| Name | purpose | Episode(s) |
|---|---|---|
| Blackberry | Colby's phone | S1E1 |
| Dell Optiplex GX280 | desktop PC | S1E7 |
| Gigabyte GK-FORCE K7 Stealth | Gaming keyboard | |
| HTC One M8 | smartphone (used by Gideon) | S1E8 |
| MaxiProx 5375 | RFID reader (turned into the "Tastic RFID Thief") | |
| MultiBlue Dongle | USB Bluetooth V3.0 HiD PC Keyboard and Mouse Switch | |
| Pwn Phone 2014 | LG Nexus 5 phone preinstalled with Pwnix | |
| Raspberry Pi | single board computer | |
| ROCCAT Savu | mouse | |
| Rubber Ducky | keyboard input | |
| Samsung Galaxy S5 | smartphone | |
| USB Keylogger | logs keyboard input | S3E10 |
WARNING: SPOILERS
WARNING: SPOILERS
| Cisco | Darlene's boyfriend, name reference to Cisco Networks, American network gear manufacturer |
|---|---|
| Frank Cody | Newscaster, parody of Alex Jones |
| Leon | could be a reference to Leon, the professional |
| Michael Hansen | Krista's ex, used the dating site Ashley Madison, which got hacked in 2015 |
WARNING: SPOILERS see also: Organizations in the Fandom wiki
| E corp | also called Evil Corp or F Corp, parody of ex-conglomerate Enron |
|---|---|
| Steel Mountain | Parody of Iron Mountain, data center and backup services |