The Shikra is a device that allows the user to interface (via USB) to a number of different low-level data interfaces such as:<meta charset="utf-8" />
The Shikra is meant to be a more reliable replacement for the shortcomings of other tools like the BusPirate. It is an indispensable tool for investigating and reverse engineering embedded systems. It is meant to be a "hardware hacking" swiss army knife to be used for interfacing with embedded devices, debugging them, bit-banging, fuzzing, etc. (Click here to read a blogpost about some things you can do with the Shikra.)
The Shikra was developed by Xipiter as a single tool to replace a handful of others. It was also developed by Xipiter to be used in Xipiter's "Software Exploitation Via Hardware Exploitation" course which teaches how to reverse engineer and attack embedded systems.
Since this tool is an in-house tool. Xipiter will be releasing software and other tools (such as hardware debugger configurations) specifically for the Shikra so that users can quickly "get to work"...
Download the STL Files to 3D-print your own case!
(Screws can be found at Ace Hardware. Item #4303-G. M1.6 x 6 pan machine screw. The manufacturer is Hillman)
All international orders may be subject to certain import customs, duties and taxes imposed by your country upon delivery. These charges are NOT included in the prices and shipping costs listed on Int3.cc. As the importer of record, you must comply with your local laws and regulations and pay all applicable duties, taxes and fees. Accordingly, we recommend that you contact your local customs office for an estimate of any applicable taxes and duties you may be charged upon delivery and for further information.
*** This device is sold AS IS. We have day jobs, so there is no support for this item (yet, but maybe we'll get there).***