Cloaked04 / Wifi-Activity-Recognition
This repository houses all files and research done for the purpose of building a system that is capable of making tracking a human using Wifi/ Radio waves.
☆44Updated 5 years ago
Alternatives and similar repositories for Wifi-Activity-Recognition:
Users that are interested in Wifi-Activity-Recognition are comparing it to the libraries listed below
- Use the ESP32 as a software motion detector for whole house based on multipath interference in RSSI. Will detect human intruders when the…☆28Updated last week
- StealthyIMU: Stealing Permission-protected Private Information From Smartphone Voice Assistant Using Zero-Permission Sensors, NDSS 2023☆20Updated 2 years ago
- DJI Drone Control Hijacking☆27Updated last year
- 802.11n CSI Tool based on iwlwifi and Linux☆75Updated 5 years ago
- ShellOrd is a C2 (Command & Control) framework cross-platform and agent written in Rust & Java☆14Updated 7 months ago
- Docker Implementation for srsRANProject☆38Updated 2 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆52Updated last year
- Force target victim to unsafe network☆20Updated this week
- A slightly more fun way to disable windows defender☆25Updated this week
- This program shows you IMSI , TMSI, LAC, CI of cellphones around you. This program was made to understand how GSM network works. Understa…☆34Updated 2 years ago
- A Jupyter Notebook Program To Visualize Your WiGLE Wardriving Data☆16Updated 3 years ago
- Rubber Ducky powered by NeoKey☆22Updated 10 months ago
- Open rTMS (Transcranial Magnetic Stimulation)☆29Updated 4 years ago
- A 2-in-1 toolset of https://github.com/x0rz/EQGRP_Lost_in_Translation and https://github.com/x0rz/EQGRP☆16Updated 5 years ago
- Covert data exfiltration and detection using 802.11 beacon stuffing☆15Updated 5 years ago
- Directory with Bluetooth exploits that is used in BlueToolkit☆13Updated 2 months ago
- Packet crafting, injection and sniffing tool☆63Updated 10 months ago
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆21Updated last year
- Android App for labelling CSI collected through the [ESP32 CSI Toolkit](https://stevenmhernandez.github.io/ESP32-CSI-Tool/)☆29Updated 3 years ago
- Kismet plugin for deauth AP☆10Updated 2 years ago
- Simple and efficient file shredding☆14Updated 5 years ago
- A custom SentinelOne USB scanner.☆18Updated 3 years ago
- LLM based autonomous agent that does online comprehensive research on any given topic☆9Updated 6 months ago
- Upload external IP so you can find your devices elsewhere☆16Updated last year
- This central repository is crafted for cybersecurity enthusiasts, researchers, and professionals aiming to advance their skills. It offer…☆14Updated 5 months ago
- HTTP based framework for building command and control components for remote access trojans☆14Updated 3 years ago
- ☆19Updated last year
- Abusing autoElevate - Fully Undetectable UAC Bypass exploit☆11Updated 2 years ago
- test example of paper, Can WiFi Estimate Person Pose?☆125Updated 5 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago