Detect Stalkers with Wardriving, using Python
☆47Aug 4, 2023Updated 2 years ago
Alternatives and similar repositories for CreepDetector
Users that are interested in CreepDetector are comparing it to the libraries listed below
Sorting:
- Low-cost WarShipping with built-in geofencing, WiFi recon, and Rogue AP on the ESP8266☆46Sep 16, 2022Updated 3 years ago
- ESP8266 wardriving scripts & Jupyter Notebook data visualization tools☆171Mar 30, 2023Updated 2 years ago
- 📡 🍍Detects activities of PineAP module and starts deauthentication attack (for fake access points - WiFi Pineapple Activities Detection…☆41May 12, 2022Updated 3 years ago
- HoppEye is a simple payload picker for BashBunny based on linking payloads to LED color.☆31Mar 7, 2018Updated 7 years ago
- WiFi Hash Purple Monster, store EAPOL & PMKID packets in an SD CARD using a M5STACK / ESP32 device☆12Aug 27, 2022Updated 3 years ago
- Upload this sketch to any Arduino and break into millions of Onity hotel locks worldwide. DC (coaxial) barrel connector required. For mor…☆24Sep 4, 2017Updated 8 years ago
- DeepSearch is a powerful Python-based OSINT utility that leverages Google's advanced search operators to perform comprehensive digital fo…☆56Dec 24, 2025Updated 2 months ago
- Texas Instruments BQ25896 driver for ATMEGA MCUs☆20Oct 6, 2024Updated last year
- ESP8266 based WiFi implant to remotely track the presence of certain people or devices via a simple web interface☆120Oct 2, 2021Updated 4 years ago
- The class resources for the v3 deauther☆21Jul 27, 2020Updated 5 years ago
- John the Ripper jumbo - advanced offline password cracker, which supports hundreds of hash and cipher types, and runs on many operating s…☆24Jun 26, 2022Updated 3 years ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆24Sep 19, 2022Updated 3 years ago
- Adding capabilities to original cyber viking.☆32Apr 9, 2025Updated 10 months ago
- Kismet "GUI" script running on a Raspberry Pi☆54Dec 14, 2025Updated 2 months ago
- Drive-by data exfiltration using open WiFi networks & DNS requests☆157Nov 26, 2023Updated 2 years ago
- Q&A Bot with Llama Index and LangChain☆28Mar 31, 2023Updated 2 years ago
- Satanic Crypter A powerful tool designed to convert EXE files into BAT files with advanced features and a modern GUI interface.☆11Jan 4, 2025Updated last year
- PhishX - The Complete Spear Phishing Tool☆14Sep 13, 2018Updated 7 years ago
- Phantom Keylogger is an advanced, stealth-enabled keystroke and visual intelligence gathering system.☆75Dec 10, 2025Updated 2 months ago
- ☆31Jan 19, 2024Updated 2 years ago
- iWar - The intelligent war dialer.☆29Apr 1, 2020Updated 5 years ago
- ☆26Jul 21, 2021Updated 4 years ago
- A simple command line tool for monitoring and logging 802.11 probe frames☆30Nov 5, 2022Updated 3 years ago
- ☆12Mar 10, 2019Updated 6 years ago
- Wireless pentesting tool with functionalities such as password cracking (in WEP and WPA/WPA2 networks), DoS attacks, client de-authentica…☆31Sep 30, 2019Updated 6 years ago
- ☆10Oct 23, 2024Updated last year
- Material For Malware Analysis Fundamentals Workshop By Eslam Abbas "Mr Robot"☆23Oct 9, 2025Updated 4 months ago
- A portable ESP32-based WiFi/Bluetooth scanner for Wigle.net.☆341Feb 5, 2026Updated 3 weeks ago
- Bashful argument parsing☆13May 13, 2020Updated 5 years ago
- Repository of studies and research data☆38Mar 31, 2022Updated 3 years ago
- The ultimate phishing tool with 38 websites available!☆14Nov 7, 2024Updated last year
- This repository is for code and documentation for Badge Engine, a Digital Promise technology☆18Dec 22, 2025Updated 2 months ago
- Android app for tracking your locations and uploading them on your private server☆11Jul 1, 2017Updated 8 years ago
- A cheatsheet and mindmap for CRTO certification☆14Mar 22, 2023Updated 2 years ago
- Enhance your Google account security with this comprehensive guide. It covers strong passwords, two-factor authentication, phishing preve…☆11Nov 21, 2024Updated last year
- ☆11Sep 23, 2023Updated 2 years ago
- Automated pipeline for downloading, staging, ingesting, and investigating leaked and declassified archives (DDoSecrets, National Security…☆31Sep 22, 2025Updated 5 months ago
- Run unmodified FUSE filesystems on Windows — (Buggy school project; you should probably use WinFsp instead)☆16Feb 17, 2014Updated 12 years ago
- A backdoor is a tool used to gain remote access to a machine. Typically, backdoor utilities such as NetCat have 2 main functions: to pip…☆13Apr 26, 2021Updated 4 years ago