{"title":"Bypass tools","description":"\u003cp data-start=\"128\" data-end=\"414\"\u003e\u003cspan\u003eProfessional bypass tools for authorized, non-destructive entry and security testing, built for locksmiths, red teams, first responders, and security professionals to identify real-world weaknesses in doors and locking hardware without causing damage. This category includes under-the-door tools, traveler hooks, latch and padlock shims, and specialty bypass equipment used to safely demonstrate vulnerabilities and strengthen overall security posture.\u003c\/span\u003e\u003c\/p\u003e","products":[{"product_id":"espkey","title":"ESPKEY","description":"\u003cp data-end=\"388\" data-start=\"206\"\u003eThe Hackitsune ESPKey Wiegand Interception \u0026amp; Replay Module is a compact, inline hardware platform designed for professional access control testing, diagnostics, and research.\u003c\/p\u003e\n\u003cp data-end=\"888\" data-start=\"390\"\u003eDesigned to sit transparently between a reader and controller, ESPKey operates on standard 5V Wiegand signalling, making it compatible with a wide range of access control systems including card readers, keypads, fobs, and many biometric devices that output Wiegand downstream.\u003c\/p\u003e\n\u003cp data-end=\"888\" data-start=\"390\"\u003eFeaturing a punchdown cable interface to allow you to tap into exposed cables coming from a range of card readers, once installed, the module can capture credential bitstreams in transit, store them in onboard non-volatile memory (up to ~80,000 records depending on format), and replay them via its built-in \u003cstrong data-end=\"887\" data-start=\"864\"\u003eWi-Fi web interface\u003c\/strong\u003e.\u003c\/p\u003e\n\u003cp data-end=\"1113\" data-start=\"890\"\u003eSmall enough to fit behind most readers, yet powerful enough to demonstrate real-world access control weaknesses, ESPKey is a practical tool for \u003cstrong data-end=\"1112\" data-start=\"1035\"\u003eauthorised red team engagements, system validation, and security training\u003c\/strong\u003e.\u003c\/p\u003e\n\u003cp data-end=\"1315\" data-start=\"1115\"\u003eThis module is based on the original open-source hardware and firmware by \u003cstrong data-end=\"1202\" data-start=\"1189\"\u003eOctoSavvi\u003c\/strong\u003e, with updates to the design to make it easier to flash (via pins on the back of the ESPKey using a compatible \u003ca href=\"https:\/\/www.hackitsune.com\/products\/ftdi-ttl-serial-adapter-module\"\u003eFTDI serial adaptor\u003c\/a\u003e or similar.) Boot and Reset buttons have been added to make the flash process easier, we recommend using a \u003ca href=\"https:\/\/www.hackitsune.com\/products\/hackitsune-2-54mm-pogo-pin-pcb-clip-clamp-fixture\"\u003epin clamp\u003c\/a\u003e or \u003ca href=\"PCB%20Clip%20Clamp\"\u003epin clip\u003c\/a\u003e to avoid having to solder contacts to the pcb. \u003c\/p\u003e\n\u003cp data-end=\"1315\" data-start=\"1115\"\u003eIn the spirit of Open Source updated Hackitsune PCB designs and build files available \u003ca href=\"https:\/\/github.com\/HacKitsuneDotCom\/ESPKey\" title=\"Github\"\u003egithub\u003c\/a\u003e\u003c\/p\u003e\n\u003cp data-end=\"750\" data-start=\"654\"\u003eSmall enough to fit behind most readers, powerful enough to demonstrate real-world vulnerabilities.\u003c\/p\u003e\n\u003ch1 data-section-id=\"1ftm249\" data-start=\"1322\" data-end=\"1346\"\u003eTechnical Requirements\u003c\/h1\u003e\n\u003cp data-start=\"1348\" data-end=\"1531\"\u003e• Compatible access control system using \u003cstrong data-start=\"1389\" data-end=\"1413\"\u003e5V Wiegand interface\u003c\/strong\u003e\u003cbr data-start=\"1413\" data-end=\"1416\"\u003e• Inline installation between reader and controller\u003cbr data-start=\"1467\" data-end=\"1470\"\u003e• Wi-Fi capable device (laptop\/mobile) for interface access\u003c\/p\u003e\n\u003ch3 data-section-id=\"1h4krfd\" data-start=\"1533\" data-end=\"1558\"\u003eInstallation Overview\u003c\/h3\u003e\n\u003cp data-start=\"1560\" data-end=\"1725\"\u003e• Connect between reader and panel using Wiegand lines (D0, D1, GND, VCC)\u003cbr data-start=\"1633\" data-end=\"1636\"\u003e• Power via standard 5V Wiegand supply\u003cbr data-start=\"1674\" data-end=\"1677\"\u003e• Device operates transparently once installed\u003c\/p\u003e\n\u003chr data-start=\"1727\" data-end=\"1730\"\u003e\n\u003ch1 data-section-id=\"7x1c8n\" data-start=\"1732\" data-end=\"1742\"\u003eFirmware\u003c\/h1\u003e\n\u003cp data-start=\"1744\" data-end=\"1762\"\u003e\u003cstrong data-start=\"1744\" data-end=\"1762\"\u003ePre-installed:\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp data-start=\"1764\" data-end=\"1811\"\u003e• Latest ESPKey firmware (shipped ready to use)\u003c\/p\u003e\n\u003ch3 data-section-id=\"8uu2t1\" data-start=\"1818\" data-end=\"1838\"\u003eFirmware Updates\u003c\/h3\u003e\n\u003cp data-start=\"1840\" data-end=\"1940\"\u003eFirmware can be installed or updated using the \u003cstrong data-start=\"1887\" data-end=\"1913\"\u003eHackitsune Web Flasher\u003c\/strong\u003e (supported browsers only):\u003c\/p\u003e\n\u003cp data-start=\"1942\" data-end=\"1997\"\u003e\u003ca data-start=\"1942\" data-end=\"1997\" rel=\"noopener\" class=\"decorated-link\" href=\"https:\/\/www.hackitsune.com\/pages\/hackitsune-web-flasher\"\u003ehttps:\/\/www.hackitsune.com\/pages\/hackitsune-web-flasher\u003cspan aria-hidden=\"true\" class=\"ms-0.5 inline-block align-middle leading-none\"\u003e\u003csvg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"20\" height=\"20\" aria-hidden=\"true\" data-rtl-flip=\"\" class=\"block h-[0.75em] w-[0.75em] stroke-current stroke-[0.75]\"\u003e\u003cuse fill=\"currentColor\" href=\"\/cdn\/assets\/sprites-core-lbtco6v1.svg#304883\"\u003e\u003c\/use\u003e\u003c\/svg\u003e\u003c\/span\u003e\u003c\/a\u003e\u003c\/p\u003e\n\u003chr data-start=\"1999\" data-end=\"2002\"\u003e\n\u003ch3 data-section-id=\"144nvga\" data-start=\"2004\" data-end=\"2044\"\u003ePost-Flash Storage Setup (Important)\u003c\/h3\u003e\n\u003cp data-start=\"2046\" data-end=\"2118\"\u003eAfter flashing ESPKey firmware, you must initialise the onboard storage:\u003c\/p\u003e\n\u003col data-start=\"2120\" data-end=\"2349\"\u003e\n\u003cli data-section-id=\"qolx0t\" data-start=\"2120\" data-end=\"2208\"\u003eConnect your laptop to the ESPKey Wi-Fi access point\u003cbr data-start=\"2175\" data-end=\"2178\"\u003e(SSID format: \u003cstrong data-start=\"2195\" data-end=\"2206\"\u003eESPKEY-\u003c\/strong\u003e*)\u003c\/li\u003e\n\u003cli data-section-id=\"13k6v5m\" data-start=\"2209\" data-end=\"2284\"\u003eDownload and run the storage setup script locally:\u003cbr data-start=\"2262\" data-end=\"2265\"\u003e\u003cstrong data-start=\"2268\" data-end=\"2284\"\u003eui-update.sh\u003c\/strong\u003e\n\u003c\/li\u003e\n\u003cli data-section-id=\"1j3ikwk\" data-start=\"2285\" data-end=\"2349\"\u003eThis process prepares the filesystem for credential storage\u003c\/li\u003e\n\u003c\/ol\u003e\n\u003cp data-start=\"2351\" data-end=\"2460\"\u003e\u003cstrong data-start=\"2351\" data-end=\"2360\"\u003eNote:\u003c\/strong\u003e\u003cbr data-start=\"2360\" data-end=\"2363\"\u003eIf this step is skipped, credential logging and storage functionality will not operate correctly.\u003c\/p\u003e\n\u003chr data-start=\"2462\" data-end=\"2465\"\u003e\n\u003ch1 data-section-id=\"tkk0fi\" data-start=\"2467\" data-end=\"2479\"\u003eHow to Use\u003c\/h1\u003e\n\u003col data-start=\"2481\" data-end=\"2741\"\u003e\n\u003cli data-section-id=\"1hs76n6\" data-start=\"2481\" data-end=\"2541\"\u003eInstall ESPKey inline between the reader and controller\u003c\/li\u003e\n\u003cli data-section-id=\"jtmhr7\" data-start=\"2542\" data-end=\"2593\"\u003ePower the system using standard Wiegand supply\u003c\/li\u003e\n\u003cli data-section-id=\"b4xuox\" data-start=\"2594\" data-end=\"2639\"\u003eConnect to the ESPKey Wi-Fi access point\u003c\/li\u003e\n\u003cli data-section-id=\"sg6zet\" data-start=\"2640\" data-end=\"2681\"\u003eAccess the web interface via browser\u003c\/li\u003e\n\u003cli data-section-id=\"cj0rlp\" data-start=\"2682\" data-end=\"2741\"\u003eCapture, store, and replay credential data as required\u003c\/li\u003e\n\u003c\/ol\u003e\n\u003chr data-start=\"2743\" data-end=\"2746\"\u003e\n\u003ch1 data-section-id=\"6q155y\" data-start=\"2748\" data-end=\"2771\"\u003eImportant Usage Notes\u003c\/h1\u003e\n\u003cp data-start=\"2773\" data-end=\"3049\"\u003e• Designed for \u003cstrong data-start=\"2788\" data-end=\"2815\"\u003e5V Wiegand systems only\u003c\/strong\u003e\u003cbr data-start=\"2815\" data-end=\"2818\"\u003e• Ensure correct wiring before installation\u003cbr data-start=\"2861\" data-end=\"2864\"\u003e• Some biometric systems output alternative protocols — verify compatibility\u003cbr data-start=\"2940\" data-end=\"2943\"\u003e• Storage must be initialised after firmware flashing\u003cbr data-start=\"2996\" data-end=\"2999\"\u003e• Device operates passively unless actively used\u003c\/p\u003e\n\u003chr data-start=\"3051\" data-end=\"3054\"\u003e\n\u003ch1 data-section-id=\"l4sc1c\" data-start=\"3056\" data-end=\"3103\"\u003ePreventative Measures to Mitigate Risk of Use\u003c\/h1\u003e\n\u003cp data-start=\"3105\" data-end=\"3372\"\u003e• Only use on systems you are authorised to test\u003cbr data-start=\"3153\" data-end=\"3156\"\u003e• Avoid deployment on production systems without approval\u003cbr data-start=\"3213\" data-end=\"3216\"\u003e• Ensure safe handling of captured credential data\u003cbr data-start=\"3266\" data-end=\"3269\"\u003e• Follow responsible disclosure practices\u003cbr data-start=\"3310\" data-end=\"3313\"\u003e• Comply with local laws regarding access control testing\u003c\/p\u003e\n\u003chr data-start=\"3374\" data-end=\"3377\"\u003e\n\u003ch1 data-section-id=\"185auby\" data-start=\"3379\" data-end=\"3408\"\u003eProduct Specifications\u003c\/h1\u003e\n\u003cdiv class=\"TyagGW_tableContainer\"\u003e\n\u003cdiv class=\"group TyagGW_tableWrapper flex flex-col-reverse w-fit\" tabindex=\"-1\"\u003e\n\u003ctable data-start=\"3410\" data-end=\"3864\" class=\"w-fit min-w-(--thread-content-width)\"\u003e\n\u003cthead data-start=\"3410\" data-end=\"3437\"\u003e\n\u003ctr data-start=\"3410\" data-end=\"3437\"\u003e\n\u003cth data-start=\"3410\" data-end=\"3426\" data-col-size=\"sm\" class=\"\"\u003eSpecification\u003c\/th\u003e\n\u003cth data-start=\"3426\" data-end=\"3437\" data-col-size=\"sm\" class=\"\"\u003eDetails\u003c\/th\u003e\n\u003c\/tr\u003e\n\u003c\/thead\u003e\n\u003ctbody data-start=\"3448\" data-end=\"3864\"\u003e\n\u003ctr data-start=\"3448\" data-end=\"3479\"\u003e\n\u003ctd data-start=\"3448\" data-end=\"3460\" data-col-size=\"sm\"\u003eInterface\u003c\/td\u003e\n\u003ctd data-col-size=\"sm\" data-start=\"3460\" data-end=\"3479\"\u003eWiegand (D0\/D1)\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr data-start=\"3480\" data-end=\"3496\"\u003e\n\u003ctd data-start=\"3480\" data-end=\"3490\" data-col-size=\"sm\"\u003eVoltage\u003c\/td\u003e\n\u003ctd data-col-size=\"sm\" data-start=\"3490\" data-end=\"3496\"\u003e5V\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr data-start=\"3497\" data-end=\"3537\"\u003e\n\u003ctd data-start=\"3497\" data-end=\"3512\" data-col-size=\"sm\"\u003eConnectivity\u003c\/td\u003e\n\u003ctd data-col-size=\"sm\" data-start=\"3512\" data-end=\"3537\"\u003eWi-Fi (web interface)\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr data-start=\"3538\" data-end=\"3590\"\u003e\n\u003ctd data-start=\"3538\" data-end=\"3548\" data-col-size=\"sm\"\u003eStorage\u003c\/td\u003e\n\u003ctd data-col-size=\"sm\" data-start=\"3548\" data-end=\"3590\"\u003e~80,000 credentials (format dependent)\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr data-start=\"3591\" data-end=\"3642\"\u003e\n\u003ctd data-start=\"3591\" data-end=\"3608\" data-col-size=\"sm\"\u003eOperation Mode\u003c\/td\u003e\n\u003ctd data-col-size=\"sm\" data-start=\"3608\" data-end=\"3642\"\u003eInline interception and replay\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr data-start=\"3643\" data-end=\"3680\"\u003e\n\u003ctd data-start=\"3643\" data-end=\"3654\" data-col-size=\"sm\"\u003eFirmware\u003c\/td\u003e\n\u003ctd data-col-size=\"sm\" data-start=\"3654\" data-end=\"3680\"\u003eESPKey (pre-installed)\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr data-start=\"3681\" data-end=\"3720\"\u003e\n\u003ctd data-start=\"3681\" data-end=\"3700\" data-col-size=\"sm\"\u003eOpen Source Base\u003c\/td\u003e\n\u003ctd data-col-size=\"sm\" data-start=\"3700\" data-end=\"3720\"\u003eO\u003ca href=\"https:\/\/github.com\/octosavvi\/ESPKey\"\u003ectoSavvi ESPKey\u003c\/a\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr data-start=\"3721\" data-end=\"3770\"\u003e\n\u003ctd data-start=\"3721\" data-end=\"3738\" data-col-size=\"sm\"\u003eHardware Files\u003c\/td\u003e\n\u003ctd data-col-size=\"sm\" data-start=\"3738\" data-end=\"3770\"\u003e\u003ca href=\"https:\/\/github.com\/HacKitsuneDotCom\/ESPKey\" title=\"Github\"\u003eGitHub\u003c\/a\u003e\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr data-start=\"3771\" data-end=\"3810\"\u003e\n\u003ctd data-start=\"3771\" data-end=\"3785\" data-col-size=\"sm\"\u003eForm Factor\u003c\/td\u003e\n\u003ctd data-col-size=\"sm\" data-start=\"3785\" data-end=\"3810\"\u003eCompact inline module\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr data-start=\"3811\" data-end=\"3864\"\u003e\n\u003ctd data-start=\"3811\" data-end=\"3822\" data-col-size=\"sm\"\u003eUse Case\u003c\/td\u003e\n\u003ctd data-col-size=\"sm\" data-start=\"3822\" data-end=\"3864\"\u003eAccess control testing and diagnostics\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003chr data-start=\"3866\" data-end=\"3869\"\u003e\n\u003ch1 data-section-id=\"1jmc5na\" data-start=\"3871\" data-end=\"3905\"\u003eKey Features \u003c\/h1\u003e\n\u003cp data-start=\"3907\" data-end=\"4292\"\u003e• Inline Wiegand interception and replay module\u003cbr data-start=\"3954\" data-end=\"3957\"\u003e• Compatible with 5V access control systems\u003cbr data-start=\"4000\" data-end=\"4003\"\u003e• Captures and stores credential bitstreams\u003cbr data-start=\"4046\" data-end=\"4049\"\u003e• Built-in Wi-Fi web interface for control\u003cbr data-start=\"4091\" data-end=\"4094\"\u003e• Stores up to ~80,000 credentials\u003cbr data-start=\"4128\" data-end=\"4131\"\u003e• Based on open-source \u003ca title=\"Octosavvi ESP Key\" href=\"https:\/\/github.com\/octosavvi\/ESPKey\"\u003eOctoSavvi ESPKey\u003c\/a\u003e platform\u003cbr data-start=\"4179\" data-end=\"4182\"\u003e• Hackitsune-enhanced PCB design and build files available\u003cbr data-start=\"4240\" data-end=\"4243\"\u003e• Firmware updatable via Hackitsune Web Flasher\u003c\/p\u003e\n\u003chr data-end=\"1846\" data-start=\"1843\"\u003e\n\u003ch2 data-end=\"3127\" data-start=\"3114\"\u003eDisclaimer\u003c\/h2\u003e\n\u003cp data-end=\"3462\" data-start=\"3129\"\u003eHackitsune hardware is designed for professional security research, development, and authorised testing purposes only. Users are responsible for ensuring compliance with all applicable laws and regulations in their jurisdiction. Always obtain proper authorisation before interacting with systems, networks, or devices you do not own.\u003c\/p\u003e\n\u003cp data-is-only-node=\"\" data-is-last-node=\"\" data-end=\"3543\" data-start=\"3464\"\u003eHackitsune accepts no liability for misuse of this product. Use responsibly. 🦊\u003c\/p\u003e","brand":"Hackitsune","offers":[{"title":"ESPKEY Only (no punchdown tool)","offer_id":51375550726360,"sku":null,"price":75.0,"currency_code":"AUD","in_stock":true},{"title":"ESPKEY \u0026 Punchdown tool (recommended)","offer_id":51375550759128,"sku":null,"price":90.0,"currency_code":"AUD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0774\/8121\/4168\/files\/HacKitsune_ESPKey_front_dhoeing_avx_punchdown_donnectors.png?v=1775181580"},{"product_id":"padlock-shims-pack-of-5","title":"Padlock Shims (Pack of 5)","description":"\u003cp data-end=\"390\" data-start=\"125\"\u003ePadlock shims are consumable bypass tools used to defeat spring-latch padlocks by inserting the shim alongside the shackle and rotating it to depress the locking latch. Their thin profile allows them to slip into many common padlock designs where tolerances permit.\u003c\/p\u003e\n\u003ch2\u003eApplication\u003c\/h2\u003e\n\u003cp data-end=\"573\" data-start=\"392\"\u003eA practical addition to any physical testing kit, shims are intended for controlled access work, training, and security research where non-destructive entry techniques are required.\u003c\/p\u003e\n\u003ch2\u003eKey Features\u003c\/h2\u003e\n\u003cul\u003e\n\u003cli\u003eUseful for evaluating susceptible padlock designs\u003c\/li\u003e\n\u003cli\u003eSupports authorised training and assessment\u003c\/li\u003e\n\u003cli\u003eCompact and easy to carry in field kits\u003c\/li\u003e\n\u003cli\u003eSuitable for locksmiths and physical security practitioners\u003c\/li\u003e\n\u003cli\u003eHelps demonstrate the importance of improved lock selection\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003ch2\u003eSafety Note\u003c\/h2\u003e\n\u003cp\u003eUse only on locks you own or are explicitly authorised to assess. Not all padlocks are susceptible, and destructive force should be avoided.\u003c\/p\u003e\n\u003ch2\u003eDisclaimer\u003c\/h2\u003e\n\u003cp\u003eHackitsune hardware is designed for professional security research, development, and authorised testing purposes only. Users are responsible for ensuring compliance with all applicable laws and regulations in their jurisdiction. Always obtain proper authorisation before interacting with systems, networks, or devices you do not own.\u003cbr\u003e\u003cbr\u003eHackitsune accepts no liability for misuse of this product. Use responsibly. 🦊\u003c\/p\u003e","brand":"Hackitsune","offers":[{"title":"Default Title","offer_id":51374169489624,"sku":null,"price":15.95,"currency_code":"AUD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0774\/8121\/4168\/files\/padlockshims.webp?v=1773377373"},{"product_id":"ch751-utility-cabinet-key-standard-lock-access-key","title":"CH751 Utility Cabinet Key – Standard Lock Access Key","description":"\u003cp data-start=\"611\" data-end=\"886\"\u003eThe \u003cstrong data-start=\"615\" data-end=\"628\"\u003eCH751 Key\u003c\/strong\u003e is a widely used utility key designed to operate CH751 cam locks commonly found on electrical cabinets, utility panels, server racks, and access enclosures. These locks are frequently used in low-security applications where quick service access is required.\u003c\/p\u003e\n\u003cp data-start=\"888\" data-end=\"1183\"\u003eSecurity professionals, facility managers, and authorised technicians often encounter CH751 locks during infrastructure audits, maintenance tasks, and security assessments. Having a CH751 key allows legitimate operators to quickly access compatible enclosures without damaging the lock hardware.\u003c\/p\u003e\n\u003cp data-start=\"1185\" data-end=\"1369\"\u003eBecause CH751 locks are widely deployed across industrial and commercial environments, this key is commonly included in toolkits for authorised facility servicing and security testing.\u003c\/p\u003e\n\u003cp data-start=\"2376\" data-end=\"2458\"\u003e\u003cstrong data-start=\"2376\" data-end=\"2391\"\u003eSafety Note\u003c\/strong\u003e\u003cbr data-start=\"2391\" data-end=\"2394\"\u003eKeys should only be used on locks you are authorised to operate.\u003c\/p\u003e\n\u003cp data-start=\"2460\" data-end=\"2808\"\u003e\u003cstrong\u003eDisclaimer\u003c\/strong\u003e\u003cbr data-start=\"2470\" data-end=\"2473\"\u003eHackitsune hardware is designed for professional security research, development, and authorised testing purposes only. Users are responsible for ensuring compliance with all applicable laws and regulations in their jurisdiction. Always obtain proper authorisation before interacting with systems, networks, or devices you do not own.\u003c\/p\u003e\n\u003cp data-start=\"2810\" data-end=\"2889\"\u003eHackitsune accepts no liability for misuse of this product. Use responsibly. 🦊\u003c\/p\u003e","brand":"Hackitsune","offers":[{"title":"Default Title","offer_id":51446402023640,"sku":null,"price":7.5,"currency_code":"AUD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0774\/8121\/4168\/files\/CH751Keys.webp?v=1773379903"},{"product_id":"door-jim-pry-bar-professional-latch-bypass-tool","title":"Door Jim Pry Bar – Professional Latch Bypass Tool","description":"\u003cp data-start=\"2931\" data-end=\"3211\"\u003eThe \u003cstrong data-start=\"2935\" data-end=\"2955\"\u003eDoor Jim Pry Bar\u003c\/strong\u003e is a non-destructive entry tool designed to assist with opening doors equipped with spring latch mechanisms. It is commonly used by locksmiths, emergency responders, and security professionals to bypass simple latch systems without damaging door hardware.\u003c\/p\u003e\n\u003cp data-start=\"3213\" data-end=\"3444\"\u003eThe tool slides between the door frame and latch assembly, allowing the user to manipulate the spring latch and release the door. This approach is frequently used during authorised lockout situations where rapid access is required.\u003c\/p\u003e\n\u003cp data-start=\"3446\" data-end=\"3571\"\u003eIts slim profile and durable construction make it a useful addition to professional physical security and locksmith toolkits.\u003c\/p\u003e\n\u003cp data-start=\"4491\" data-end=\"4610\"\u003e\u003cstrong data-start=\"4491\" data-end=\"4506\"\u003eSafety Note\u003c\/strong\u003e\u003cbr data-start=\"4506\" data-end=\"4509\"\u003eThese tools are intended for professional locksmithing and authorised physical security testing only.\u003c\/p\u003e\n\u003cp data-start=\"4612\" data-end=\"4960\"\u003e\u003cstrong\u003eDisclaimer\u003c\/strong\u003e\u003cbr data-start=\"4622\" data-end=\"4625\"\u003eHackitsune hardware is designed for professional security research, development, and authorised testing purposes only. Users are responsible for ensuring compliance with all applicable laws and regulations in their jurisdiction. Always obtain proper authorisation before interacting with systems, networks, or devices you do not own.\u003c\/p\u003e\n\u003cp data-start=\"4962\" data-end=\"5041\"\u003eHackitsune accepts no liability for misuse of this product. Use responsibly. 🦊\u003c\/p\u003e","brand":"Hackitsune","offers":[{"title":"Default Title","offer_id":51446404841688,"sku":null,"price":19.0,"currency_code":"AUD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0774\/8121\/4168\/files\/DoorJim2.webp?v=1773382310"},{"product_id":"hackitsune-j-tool-for-thumb-turn-locks","title":"Hackitsune J Tool for Thumb Turn Locks","description":"\u003cp\u003eThe J Tool for Thumb Turn Locks is a specialised physical security accessory intended for authorised lockout response, facilities work, and controlled physical security assessments.\u003c\/p\u003e\n\u003cp\u003eIts profile is designed for environments where a researcher, locksmith, or facilities professional needs a non-destructive method to reach and manipulate compatible thumb-turn hardware without dismantling the door assembly.\u003c\/p\u003e\n\u003cp\u003eThis type of tool is typically used during access control reviews, emergency lockout support, and authorised red team exercises focused on mechanical weaknesses in door hardware.\u003c\/p\u003e\n\u003ch2\u003eApplication\u003c\/h2\u003e\n\u003cp\u003eInserted under door or between door for authorised lockout response and physical security testing on compatible internal thumb-turn lock hardware.\u003c\/p\u003e\n\u003ch2\u003eProduct Specification Table\u003c\/h2\u003e\n\u003ctable\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003ctd\u003e\u003cstrong\u003eTool Type\u003c\/strong\u003e\u003c\/td\u003e\n\u003ctd\u003eThumb-turn manipulation tool\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd\u003e\u003cstrong\u003eUse Case\u003c\/strong\u003e\u003c\/td\u003e\n\u003ctd\u003eAuthorised lockout and security assessment work\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd\u003e\u003cstrong\u003eConstruction\u003c\/strong\u003e\u003c\/td\u003e\n\u003ctd\u003eHand tool for field carry\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd\u003e\u003cstrong\u003eCompatibility\u003c\/strong\u003e\u003c\/td\u003e\n\u003ctd\u003eSelected thumb-turn lock setups\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e\n\u003ch2\u003e\u003c\/h2\u003e\n\u003ch2\u003eSafety Note\u003c\/h2\u003e\n\u003cp\u003eAlways ensure that there is sufficient tolerance to use the tool without causing damage to door or fixtures.\u003c\/p\u003e\n\u003ch2\u003eDisclaimer\u003c\/h2\u003e\n\u003cp\u003eHackitsune hardware is designed for professional security research, development, and authorised testing purposes only. Users are responsible for ensuring compliance with all applicable laws and regulations in their jurisdiction. Always obtain proper authorisation before interacting with systems, networks, or devices you do not own.\u003cbr\u003e\u003cbr\u003eHackitsune accepts no liability for misuse of this product. Use responsibly. 🦊\u003c\/p\u003e","brand":"Hackitsune","offers":[{"title":"Default Title","offer_id":51446426992856,"sku":"HK-J-TOOL-THUMBTURN","price":25.0,"currency_code":"AUD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0774\/8121\/4168\/files\/JToolforthumbturnlocks.webp?v=1773384063"},{"product_id":"hackitsune-nano-insert-sheet-door-bypass-tool-set","title":"Plastic Shim (Pack of 5) Door Bypass Tool","description":"\u003cp\u003eThis is a pack of 5 thin flexible sheets intended for authorised locksmith work, latch evaluation, and physical security training.\u003c\/p\u003e\n\u003cp\u003eThese tools are typically used to assess whether door tolerances and latch designs permit simple bypass pressure in situations where non-destructive testing is authorised and appropriate.\u003c\/p\u003e\n\u003cp\u003eFor professional users, insert sheets are useful for demonstrating door hardware weaknesses and validating whether mitigations such as guards, strike improvements, or latch redesign are necessary.\u003c\/p\u003e\n\u003ch2\u003eProduct Specification Table\u003c\/h2\u003e\n\u003ctable\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003ctd\u003e\u003cstrong\u003eSet Size\u003c\/strong\u003e\u003c\/td\u003e\n\u003ctd\u003e5 pieces\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd\u003e\u003cstrong\u003eTool Type\u003c\/strong\u003e\u003c\/td\u003e\n\u003ctd\u003eThin insert \/ bypass sheets\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd\u003e\u003cstrong\u003eUse Case\u003c\/strong\u003e\u003c\/td\u003e\n\u003ctd\u003eAuthorised latch evaluation and training\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd\u003e\u003cstrong\u003eMaterial\u003c\/strong\u003e\u003c\/td\u003e\n\u003ctd\u003eFlexible sheet construction\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e\n\u003ch2\u003eKey Features\u003c\/h2\u003e\n\u003cul\u003e\n\u003cli\u003eUseful for latch vulnerability assessment\u003c\/li\u003e\n\u003cli\u003eSupports locksmith training and demonstration work\u003c\/li\u003e\n\u003cli\u003eNon-destructive tool class for compatible scenarios\u003c\/li\u003e\n\u003cli\u003eMultiple sheets for different gap and latch profiles\u003c\/li\u003e\n\u003cli\u003eCompact and easy to carry in field kits\u003c\/li\u003e\n\u003cli\u003eEasily cut to custom shape to suit requirements.\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003ch2\u003eSafety Note\u003c\/h2\u003e\n\u003cp\u003eThese tools are intended for professional locksmithing and authorised physical security testing only. Avoid damage to doors, weather seals, and frame components during use.\u003c\/p\u003e\n\u003ch2\u003eDisclaimer\u003c\/h2\u003e\n\u003cp\u003eHackitsune hardware is designed for professional security research, development, and authorised testing purposes only. Users are responsible for ensuring compliance with all applicable laws and regulations in their jurisdiction. Always obtain proper authorisation before interacting with systems, networks, or devices you do not own.\u003cbr\u003e\u003cbr\u003eHackitsune accepts no liability for misuse of this product. Use responsibly. 🦊\u003c\/p\u003e","brand":"Hackitsune","offers":[{"title":"Default Title","offer_id":51446427320536,"sku":"HK-NANO-INSERT-SHEETS","price":19.95,"currency_code":"AUD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0774\/8121\/4168\/files\/plasticshims1.avif?v=1773376967"}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0774\/8121\/4168\/collections\/Bypass_tools.png?v=1770602208","url":"https:\/\/www.hackitsune.com\/collections\/bypass-tools.oembed","provider":"Hackitsune","version":"1.0","type":"link"}