Research Instrument

Kill Shot
Forensic USB Research Tool

Spit Another Hook.

"Answer to the riddle, more hidden than the crook / Only way to find it is to spit another hook" -- JJ DOOM, "Bookfiend"
Kill Shot Device
Forensic USB Research Instrument
Capture Mode Passive Only
Chain of Custody SHA-256
Log Encryption AES-256-GCM
Anti-Misuse Self-Destruct
Packaging Tamper-Evident
Classification Research Instrument
-- Research Units Deployed
$0 Cost to Veterans
100% Passive Capture

Passive forensic capture device. Plug in, walk away, check your logs. Published methodology. Peer-reviewable. Institutional-grade.

Forensic-Grade. Passive by Design.

Kill Shot captures system activity without ever injecting code, sending packets, or modifying the target. What it records is what was already happening. Every byte is hashed, encrypted, and logged.

Passive Capture Only

The device never injects code, never sends packets, never modifies the host system. It observes and records what is already broadcast or accessible. Read-only. Always.

SHA-256 Chain of Custody

Every captured event is hashed with SHA-256 in a sequential chain. Each entry references the previous hash. Tampering breaks the chain and is immediately detectable. Court-admissible integrity.

AES-256-GCM Encrypted Logs

All captured data is encrypted at rest using AES-256-GCM. Logs cannot be read without the research key. Even if the device is physically seized, the data is cryptographically protected.

Self-Destruct on Misuse

If the device detects offensive use -- injection attempts, packet crafting, active exploitation -- it bricks itself. Firmware wipe. No recovery. No refunds. The tool enforces its own ethics.

Tamper-Evident Packaging

Ships in tamper-evident sealed packaging with a unique serial hash printed on the seal. If the seal is broken before delivery, the chain of custody starts compromised -- and you know it.

Universal USB Compatibility

Works on any USB-capable system. No drivers. No software installation. No dependencies. Plug in, the device handles the rest. Standalone firmware -- no computer needed to operate.

Research Tool -- Not a Hacking Device

This is a forensic research instrument with published methodology. It has no offensive capability by design. The self-destruct protocol is not a warning -- it is a guarantee. Misuse triggers permanent device destruction. No exceptions. No refunds.

Built for the Evidence Locker

Every specification serves forensic integrity. No feature exists for convenience that compromises evidentiary value.

Specification Detail
Capture Mode Passive only -- read, observe, record. Never inject.
Hashing Algorithm SHA-256 sequential chain (each entry references previous hash)
Encryption AES-256-GCM (authenticated encryption with associated data)
Anti-Misuse Protocol Firmware self-destruct on offensive use detection. Irreversible.
Packaging Tamper-evident seal with unique serial hash
Compatibility Any USB-capable system. No drivers. No software. Standalone firmware.
Methodology Published and peer-reviewable. Open research protocol.
Data Sovereignty All data stays on-device. No cloud. No telemetry. No phone-home.
Classification Research instrument. machentagar.ca Research Institute.

Plug In. Walk Away. Check Your Logs.

Three steps. No configuration. No expertise required. The device handles everything from capture to encryption to chain-of-custody logging.

1

Insert Device

Plug Kill Shot into any USB port. The device initializes in passive mode. No drivers, no prompts, no installation. Silent start.

2

Passive Capture

The device observes and records system activity. Every event is SHA-256 hashed in sequence. All data encrypted with AES-256-GCM. The chain of custody builds itself.

3

Retrieve Logs

Remove the device. Decrypt logs with your research key. Verify the hash chain. Every entry is timestamped, hashed, and court-ready.

Institutions Pay. People Get It Free. Always.

Frederick Banting sold his insulin patent for $1 because he believed life-saving tools should be accessible. Kill Shot follows the same principle. Veterans and First Nations communities pay nothing. Ever.

One Shot
$49 CAD

Single licence. One device. Full capability.

  • Full forensic capture device
  • SHA-256 chain of custody
  • AES-256-GCM encrypted logs
  • Tamper-evident packaging
  • Self-destruct anti-misuse
  • Published research methodology
Buy Now -- $49 CAD
Law Firm Licence
$1,000 CAD

Per shot. Institutional deployment. Volume terms available.

  • Everything in standard tiers
  • Institutional chain-of-custody protocols
  • Custom firmware configurations
  • Training documentation
  • Priority support
  • Volume deployment assistance
Buy Now -- $1,000 CAD

All prices in Canadian dollars. No refunds. Self-destruct on misuse. Research instrument -- not a hacking device. All proceeds reinvested into housing, social reform, and community grants via 15988730 Canada Inc.