Spit Another Hook.
"Answer to the riddle, more hidden than the crook / Only way to find it is to spit another hook" -- JJ DOOM, "Bookfiend"
Passive forensic capture device. Plug in, walk away, check your logs. Published methodology. Peer-reviewable. Institutional-grade.
Kill Shot captures system activity without ever injecting code, sending packets, or modifying the target. What it records is what was already happening. Every byte is hashed, encrypted, and logged.
The device never injects code, never sends packets, never modifies the host system. It observes and records what is already broadcast or accessible. Read-only. Always.
Every captured event is hashed with SHA-256 in a sequential chain. Each entry references the previous hash. Tampering breaks the chain and is immediately detectable. Court-admissible integrity.
All captured data is encrypted at rest using AES-256-GCM. Logs cannot be read without the research key. Even if the device is physically seized, the data is cryptographically protected.
If the device detects offensive use -- injection attempts, packet crafting, active exploitation -- it bricks itself. Firmware wipe. No recovery. No refunds. The tool enforces its own ethics.
Ships in tamper-evident sealed packaging with a unique serial hash printed on the seal. If the seal is broken before delivery, the chain of custody starts compromised -- and you know it.
Works on any USB-capable system. No drivers. No software installation. No dependencies. Plug in, the device handles the rest. Standalone firmware -- no computer needed to operate.
Every specification serves forensic integrity. No feature exists for convenience that compromises evidentiary value.
| Specification | Detail |
|---|---|
| Capture Mode | Passive only -- read, observe, record. Never inject. |
| Hashing Algorithm | SHA-256 sequential chain (each entry references previous hash) |
| Encryption | AES-256-GCM (authenticated encryption with associated data) |
| Anti-Misuse Protocol | Firmware self-destruct on offensive use detection. Irreversible. |
| Packaging | Tamper-evident seal with unique serial hash |
| Compatibility | Any USB-capable system. No drivers. No software. Standalone firmware. |
| Methodology | Published and peer-reviewable. Open research protocol. |
| Data Sovereignty | All data stays on-device. No cloud. No telemetry. No phone-home. |
| Classification | Research instrument. machentagar.ca Research Institute. |
Three steps. No configuration. No expertise required. The device handles everything from capture to encryption to chain-of-custody logging.
Plug Kill Shot into any USB port. The device initializes in passive mode. No drivers, no prompts, no installation. Silent start.
The device observes and records system activity. Every event is SHA-256 hashed in sequence. All data encrypted with AES-256-GCM. The chain of custody builds itself.
Remove the device. Decrypt logs with your research key. Verify the hash chain. Every entry is timestamped, hashed, and court-ready.
Frederick Banting sold his insulin patent for $1 because he believed life-saving tools should be accessible. Kill Shot follows the same principle. Veterans and First Nations communities pay nothing. Ever.
Single licence. One device. Full capability.
Three licences. Save $48. Deploy across sites.
Per shot. Institutional deployment. Volume terms available.
Always free. No exceptions. No means testing. No expiry.
Veterans conducting personal forensic research. First Nations communities -- distribute to membership, unlimited. Indigenous Community Edition included.
Apply for Free LicenceAll prices in Canadian dollars. No refunds. Self-destruct on misuse. Research instrument -- not a hacking device. All proceeds reinvested into housing, social reform, and community grants via 15988730 Canada Inc.