Detect Stalkers with Wardriving, using Python
☆47Aug 4, 2023Updated 2 years ago
Alternatives and similar repositories for CreepDetector
Users that are interested in CreepDetector are comparing it to the libraries listed below
Sorting:
- Low-cost WarShipping with built-in geofencing, WiFi recon, and Rogue AP on the ESP8266☆46Sep 16, 2022Updated 3 years ago
- An ESP8266 based promiscuous WiFi sniffer to track devices emitting probe requests☆51Apr 12, 2021Updated 4 years ago
- ESP8266 wardriving scripts & Jupyter Notebook data visualization tools☆171Mar 30, 2023Updated 2 years ago
- 📡 🍍Detects activities of PineAP module and starts deauthentication attack (for fake access points - WiFi Pineapple Activities Detection…☆41May 12, 2022Updated 3 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆15Jul 13, 2021Updated 4 years ago
- Upload this sketch to any Arduino and break into millions of Onity hotel locks worldwide. DC (coaxial) barrel connector required. For mor…☆25Sep 4, 2017Updated 8 years ago
- WiFi Hash Purple Monster, store EAPOL & PMKID packets in an SD CARD using a M5STACK / ESP32 device☆12Aug 27, 2022Updated 3 years ago
- ☆31Jan 19, 2024Updated 2 years ago
- The class resources for the v3 deauther☆21Jul 27, 2020Updated 5 years ago
- HoppEye is a simple payload picker for BashBunny based on linking payloads to LED color.☆31Mar 7, 2018Updated 8 years ago
- Kismet "GUI" script running on a Raspberry Pi☆54Dec 14, 2025Updated 3 months ago
- A repository for maintaining a list of the top domains based on multiple lists☆23May 1, 2022Updated 3 years ago
- Wireless pentesting tool with functionalities such as password cracking (in WEP and WPA/WPA2 networks), DoS attacks, client de-authentica…☆31Sep 30, 2019Updated 6 years ago
- DeepSearch is a powerful Python-based OSINT utility that leverages Google's advanced search operators to perform comprehensive digital fo…☆59Dec 24, 2025Updated 2 months ago
- ESP8266 based WiFi implant to remotely track the presence of certain people or devices via a simple web interface☆120Oct 2, 2021Updated 4 years ago
- Adding capabilities to original cyber viking.☆32Apr 9, 2025Updated 11 months ago
- A script used to query the dehashed API and filter for more useful results☆16Jun 20, 2021Updated 4 years ago
- Cross-platform USB thermal camera viewer☆17Feb 9, 2023Updated 3 years ago
- Drive-by data exfiltration using open WiFi networks & DNS requests☆157Nov 26, 2023Updated 2 years ago
- Class☆10Nov 10, 2020Updated 5 years ago
- A lightly modified kernel for the Nexus 6P. Based on stock Android msm sources and leanKernel☆10Mar 20, 2018Updated 8 years ago
- ☆18Jan 2, 2018Updated 8 years ago
- LUA dissector plugin generator for Wireshark☆14Oct 17, 2024Updated last year
- Repository of studies and research data☆38Mar 31, 2022Updated 3 years ago
- Effortlessly Find Comprehensive Information on Individuals with Our dedsec People Search Tool!☆35Apr 17, 2025Updated 11 months ago
- Kernel source tree for Raspberry Pi Foundation-provided kernel builds. Issues unrelated to the linux kernel should be posted on the commu…☆38Jul 2, 2022Updated 3 years ago
- Awesome-Cellular-Hacking☆73Aug 19, 2021Updated 4 years ago
- ☆10Feb 15, 2023Updated 3 years ago
- Big Dorker☆14Oct 18, 2024Updated last year
- ☆12Mar 10, 2019Updated 7 years ago
- A simple command line tool for monitoring and logging 802.11 probe frames☆30Nov 5, 2022Updated 3 years ago
- Aircraft classifiers for TAK☆12Jan 11, 2026Updated 2 months ago
- tinydb 是用 Python 实现的一个很精巧的 nosql 数据库. 源码值得注解.☆10Sep 13, 2016Updated 9 years ago
- Install an arsenal of OSINT tools by running IntelBox on your Debian VM or OS☆16Oct 21, 2022Updated 3 years ago
- ☆26Jul 21, 2021Updated 4 years ago
- Download videos and images from snapmap, reels and spotlight☆14Oct 18, 2023Updated 2 years ago
- Searchsploit alternative. It differs in that it uses searchengines, can run unattended in the background, plays well with nmap and is abl…☆17Jul 9, 2020Updated 5 years ago
- Dorkscanner Tools☆10Dec 20, 2022Updated 3 years ago
- The code implements ransomware-like behavior, encrypting files by changing their extensions to "k3vil." It includes a decryption process …☆19May 23, 2024Updated last year