Cloaked04 / Wifi-Activity-RecognitionLinks
This repository houses all files and research done for the purpose of building a system that is capable of making tracking a human using Wifi/ Radio waves.
☆53Updated 5 years ago
Alternatives and similar repositories for Wifi-Activity-Recognition
Users that are interested in Wifi-Activity-Recognition are comparing it to the libraries listed below
Sorting:
- DJI Drone Control Hijacking☆36Updated 2 years ago
- A quantum enhanced, totaly private encryption app that uses true random key generation from zero point energy.☆13Updated 4 months ago
- Upload external IP so you can find your devices elsewhere☆16Updated last year
- Force target victim to unsafe network☆29Updated 5 months ago
- Covert data exfiltration and detection using 802.11 beacon stuffing☆17Updated 6 years ago
- Proxy tool that bridges the gap between the Sniffle Bluetooth 5 long range extended sniffing and Kismet's ANTSDR capture mechanism. This …☆17Updated last year
- Legba recipes.☆51Updated last year
- RF-modulated high fidelity laser microphone and keystroke sniffer☆80Updated last year
- Hardware & computer guide for AI: how to choose & build a computer. This guide is intended for beginers in hardware, in order to plan wh…☆11Updated 3 years ago
- ☆21Updated last year
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 3 years ago
- Rubber Ducky powered by NeoKey☆26Updated last year
- Hacking the Singularity. Deep learning hacking. Weaponizing AI in Offensive security☆105Updated last year
- Framework for abuse Apple Find My Network to perform unprivileged device tracking. USENIX Security '25 and DEFCON Demo Labs.☆58Updated 3 months ago
- Repository for the Framing Frames publication: security context and transmit queue manipulations, client isolation bypasses, and more.☆47Updated 2 years ago
- ☆27Updated last year
- RattaGATTa: Scalable Bluetooth Low-Energy Survey Using a pool of collectors to scan and connect to BTLE devices, shedding light on the in…☆42Updated 10 months ago
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆27Updated 11 months ago
- ☆11Updated 2 years ago
- Monitor 802.11 probe requests from a capture file or network sniffing!☆33Updated 9 months ago
- Bluekit is an extensible engine, CLI tool used in BlueToolkit☆13Updated 2 months ago
- A compact and simple program targeting SIMATIC S7 Programmable Logic Controllers (PLCs) written in Go. Allowing for cross-compilation to …☆57Updated 10 months ago
- Open Keylogger Hardware Implant - USB & PS2 Keyboards☆91Updated last month
- Self replicating and automatically spreading SSH worm that recovers login credentials☆54Updated 2 years ago
- Exploits of different CVE IDs (CVE-2021-37910, CVE-2021-40288, CVE-2021-41435, CVE-2021-41436, CVE-2021-41437, CVE-2021-41441, CVE-2021-4…☆17Updated 3 years ago
- A tool designed for penetration testers to perform attacks on LAN and WLAN networks, including network discovery, exploitation, and NAC b…☆42Updated 4 months ago
- ShellOrd is a C2 (Command & Control) framework cross-platform and agent written in Rust & Java☆15Updated last year
- ☆18Updated 2 years ago
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆19Updated 2 years ago
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆28Updated 7 months ago