strykerdefence.com Open in urlscan Pro
2606:4700:20::ac43:475c  Public Scan

Submitted URL: http://strykerdef.com/
Effective URL: https://strykerdefence.com/
Submission: On February 11 via api from US — Scanned from DE

Form analysis 2 forms found in the DOM

POST /users/login/

<form id="auth-login" method="POST" action="/users/login/">
  <input type="hidden" name="csrfmiddlewaretoken" value="fe13X7uZnTejcoiVqKUBYamP6E3dvbnVKN2Qyea9tI6q5Wmb059fb8lwkwFEa9jC">
  <div class="auth-input">
    <a><div>Email</div></a>
    <img src="https://cdn.strykerdefence.com/static/img/home/mail.svg">
    <input type="email" name="email">
    <div class="auth-clue"></div>
  </div>
  <div class="auth-input">
    <a><div>Password</div></a>
    <img src="https://cdn.strykerdefence.com/static/img/home/password.svg">
    <input type="password" name="password">
    <div class="auth-clue"></div>
  </div>
  <a class="button-gray parent-submit">
<img src="https://cdn.strykerdefence.com/static/img/home/door.svg">
<p>Login</p>
</a>
  <a href="https://accounts.google.com/o/oauth2/auth?redirect_uri=https://strykerdefence.com/auth/google/&amp;response_type=code&amp;client_id=524334001017-9jfdkpd73bn319pogkprbgioj60lq4ab.apps.googleusercontent.com&amp;scope=https://www.googleapis.com/auth/userinfo.email+https://www.googleapis.com/auth/userinfo.profile" class="button-gray parent-submit">
<img src="https://cdn.strykerdefence.com/static/img/home/google.svg">
<p>Google Login</p>
</a>
  <a id="password-reset" class="button-gray parent-submit">
<img src="https://cdn.strykerdefence.com/static/img/home/key.svg">
<p>Password recovery</p>
</a>
</form>

POST /users/registration/

<form id="auth-register" method="POST" action="/users/registration/">
  <input type="hidden" name="csrfmiddlewaretoken" value="fe13X7uZnTejcoiVqKUBYamP6E3dvbnVKN2Qyea9tI6q5Wmb059fb8lwkwFEa9jC">
  <div class="auth-input">
    <a><div>Username</div></a>
    <img src="https://cdn.strykerdefence.com/static/img/home/user.svg">
    <input type="text" name="username">
    <div class="auth-clue">Use letters, numbers and dots, length from 5 symbols.</div>
  </div>
  <div class="auth-input">
    <a><div>Email</div></a>
    <img src="https://cdn.strykerdefence.com/static/img/home/mail.svg">
    <input type="email" name="email">
    <div class="auth-clue"></div>
  </div>
  <div class="auth-input">
    <a><div>Password</div></a>
    <img src="https://cdn.strykerdefence.com/static/img/home/password.svg">
    <input type="password" name="password">
    <div class="auth-clue">Required to use any letter and digit, length from 8 symbols</div>
  </div>
  <a class="button-gray parent-submit">
<img src="https://cdn.strykerdefence.com/static/img/home/profile.svg">
<p>Registration</p>
</a>
</form>

Text Content

Stryker Stick pre-order opened. Pre-Order Now! (54.99$)

Stryker

Features
Prices
Wiki
FAQ
Menu
Navigation
Features
Prices
Wiki
FAQ

Account
Login
Register

Contact us
Email
Telegram

Login/Regstration

Stryker - pentest workspace
in your smartphone

Download





FEATURES





RSCAN

Scan router for vulnerabilities (20+) and default password via range or IP mask!
Report generation and multi-thread.




WIFI SCANNER

The most advanced and permissionless scanner. Detect model, channel, vendor in a
second!


WIFI VULNERABILITIES CHECKER

Check all common wifi vulnerabilities with your phone! Launch attack with a
click!




WIFI SCANNER

The most advanced and permissionless scanner. Detect model, channel, vendor in a
second!


WIFI VULNERABILITIES CHECKER

Check all common wifi vulnerabilities with your phone! Launch attack with a
click!


LOCAL NETWORK SCANNER

Detect vendor, OS, services, device names, types and smartphone model.


DEVICE VULNERABILITIES CHECKER

Detect, brute and exploit most common vulnerabilities in one click!


VNC SERVER

Select and install your preferred multifunctional graphic environment within a
minute.


EXPLOIT MANAGER

Launch personalized exploits or modify the default ones through a specialized
wizard.


SEARCHSPLOIT

Search new exploits by keywords and download them in one click. Create your
personalized setup.


RSCAN

Scan router for vulnerabilities (20+) and default password via range or IP mask!
Report generation and multi-thread.




PRICES

Monthly
Annually


FREE

$0

• Basic functions
• 4 simple exploits
• Basic WiFi info
• Basic devices info
• Basic local network info
• Mac changer
• Megacut
Download


PRO

$10

$30

$100

$300

• WiFi vulnerabilities scanner
• Extended vulnerabilities scanner
• Geo-Mac modal dialog
• Metasploit Framework
• Captive Portal
• Site vulnerabilities scanner
• Payload generator
• Online exploit library
• 35+ protocols brute
• Captive Portal Bypass (upcoming)
Purchase


CORPORATE

$Individual

• Functions by request
• Add any tools
• Generate reports
• Every function extended
• Add own tools and utilities
• Add private exploits
• Exploit monitor
... and extra possibilities
Contact us


EXTRA RESOURCES


WIKI


CHAT


PRIVACY & POLICY


GITHUB


EMAIL


TERMS


YOUTUBE


QQ


MISSION


FAQ

What is Stryker?

Stryker is a new app for pentest with a smartphone.
It is fully interactive and differs in small size and great functionality from
competitors.
Unlike other similar developments, no special knowledge and skills are required.

How to install?

The installation process is simple and is completed by following a step-by-step
procedure. Just follow the instructions on the welcome screens.

How it Works?

Stryker is not only an application but also an Alpine Linux! The application
interacts and processes the output from the Alpine environment and displays a
clear result.

I have an error

Since all phones are different, it is impossible to guarantee that all attacks
will work on your device.
If you have an error you can send log to support@strykerdefence.com!

How to contact?

If you have any errors or questions, you can write to our chat
To follow the news, you can subscribe to our channel
If you have suggestions, you can write them to the support@strykerdefence.com

What are the minimal requirements?

Android 8.0+ (required)
Root (required)
Qualcomm CPU (optimal)


AUTHENTICATION

Login
Registration
Email

Password


Login

Google Login

Password recovery

Username
Use letters, numbers and dots, length from 5 symbols.
Email

Password
Required to use any letter and digit, length from 8 symbols

Registration

Stryker Defense Inc. All rights reserved © 2023


ETHICAL HACKING STANDARDS

Read Before Use
Read
Close