Cloaked04 / Wifi-Activity-RecognitionLinks
This repository houses all files and research done for the purpose of building a system that is capable of making tracking a human using Wifi/ Radio waves.
☆54Updated 5 years ago
Alternatives and similar repositories for Wifi-Activity-Recognition
Users that are interested in Wifi-Activity-Recognition are comparing it to the libraries listed below
Sorting:
- DJI Drone Control Hijacking☆41Updated 2 years ago
- A quantum enhanced, totaly private encryption app that uses true random key generation from zero point energy.☆12Updated 6 months ago
- Force target victim to unsafe network☆29Updated 7 months ago
- Proxy tool that bridges the gap between the Sniffle Bluetooth 5 long range extended sniffing and Kismet's ANTSDR capture mechanism. This …☆18Updated last year
- A utility to inspect, validate, sign and verify machine learning model files.☆64Updated 11 months ago
- Framework for abuse Apple Find My Network to perform unprivileged device tracking. USENIX Security '25 and DEFCON Demo Labs.☆60Updated 5 months ago
- Legba recipes.☆51Updated last year
- Upload external IP so you can find your devices elsewhere☆16Updated last year
- Covert data exfiltration and detection using 802.11 beacon stuffing☆16Updated 6 years ago
- RF-modulated high fidelity laser microphone and keystroke sniffer☆85Updated last year
- Use the ESP32 as a software motion detector for whole house based on multipath interference in RSSI. Will detect human intruders when the…☆45Updated 5 months ago
- Repository for the Framing Frames publication: security context and transmit queue manipulations, client isolation bypasses, and more.☆47Updated 2 years ago
- ☆60Updated 2 years ago
- Custom firmware for nrf52840-dongle, allowing to easily eavesdrop Bluetooth Low Energy communications and perform multiple active attacks…☆65Updated 3 years ago
- Open Keylogger Hardware Implant - USB & PS2 Keyboards☆97Updated 2 months ago
- Hands-on workshop on the basics of hardware hacking.☆122Updated 2 years ago
- ☆18Updated 2 years ago
- Hacking the Singularity. Deep learning hacking. Weaponizing AI in Offensive security☆106Updated last year
- Purpose-built Red Team network hardware implant made from common components.☆25Updated 2 years ago
- The EMP Jammer is an innovative jamming device which jams the devices nearby by inducing an alternating voltage in it .☆13Updated 3 years ago
- A tool designed for penetration testers to perform attacks on LAN and WLAN networks, including network discovery, exploitation, and NAC b…☆44Updated 5 months ago
- ☆12Updated 3 years ago
- CLI and API server for https://github.com/dreadnode/robopages☆38Updated last week
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 3 years ago
- Rubber Ducky powered by NeoKey☆28Updated last year
- Card calculator and Proxmark3 Plugin for writing and/or simulating every card type that Doppelgänger Community, Pro, Stealth, and MFAS su…☆27Updated last month
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆15Updated last year
- ☆10Updated 2 years ago
- ☆59Updated 6 years ago
- A Completely Modular LLM Reverse Engineering, Red Teaming, and Vulnerability Research Framework.☆54Updated last year