FoggedLens / alprleaks
Log ALPR data using a Motorola vulnerability
☆78Updated 2 months ago
Alternatives and similar repositories for alprleaks:
Users that are interested in alprleaks are comparing it to the libraries listed below
- Scans for BLE devices and if it see any from Taser International sets an home assistant switch to 'on', turns back off a minute after the…☆132Updated 8 months ago
- Crowdsourced tool for locating and reporting ALPRs☆72Updated last week
- its like a tricorder, for your wireless world.☆91Updated last year
- its like a tricorder, for your wireless world.☆110Updated last year
- Multi-headed 802.11 panopticon☆200Updated 3 months ago
- BusKill's main CLI/GUI app for arming/disarming/configuring the BusKill laptop kill cord☆215Updated 2 months ago
- 3D printable design to adapt Lishi 6-pin picks for use in 5-pin locks☆77Updated 8 months ago
- ✈️ A device that detects for aircraft spoofing by monitoring for malicious ADS-B signals in the 1090MHz frequency. Built using a Raspberr…☆205Updated last year
- A simple Python script for detecting nearby Axon law enforcement equipment using Bluetooth Low Energy.☆25Updated last year
- a copy of TOOOL's "Ultimate Handcuff Key" diagram from 2009☆60Updated 2 years ago
- The blue-merle package enhances anonymity and reduces forensic traceability of the GL-E750 Mudi 4G mobile wi-fi router☆226Updated last month
- ☆28Updated last year
- A SIGINT Go-kit of sorts☆197Updated last month
- An Open-Source Door Simulator for RFID/PACS Training☆120Updated 4 months ago
- ☆143Updated 7 months ago
- ☆20Updated last year
- a tiny USB rubber ducky that can be concealed entirely inside the USB port. Various hardware improvements compared to v1☆77Updated 2 months ago
- Linux based WiFi pentesting device for the Flipper Zero.☆37Updated this week
- ☆218Updated this week
- Repo to house findings for the DC32 Badge Hack☆20Updated 7 months ago
- Rust tool to detect cell site simulators on an orbic mobile hotspot☆1,464Updated this week
- Use Python to map a website's external facing links. And then apply D3 to visualize those outbound connections as a network graph.☆16Updated last month
- RF-modulated high fidelity laser microphone and keystroke sniffer☆71Updated 5 months ago
- My revision of Jhewits Wardriver☆16Updated 8 months ago
- ☆17Updated 5 years ago
- The Tick is the next evolution in covert access control system implants for simulating adversary-in-the-middle attacks.☆117Updated this week
- Signals intelligence (SIGINT) gathering by interception of WiFi, Bluetooth and GSM☆65Updated 2 months ago
- Easy to deploy API for transcribing and translating audio / video using OpenAI's whisper model.☆66Updated 11 months ago
- The Swiss Army Knife For All Your Osint Needs.☆35Updated 2 weeks ago
- Uses an ATOM M5 GPS Kit for Wigle wardriving☆27Updated 4 months ago