Wi-Fi tracking system for testing and demonstrational purpose
☆30Jul 17, 2020Updated 5 years ago
Alternatives and similar repositories for wombat
Users that are interested in wombat are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Estimates the uniqueness of a device based on the content of its emitted Wi-Fi frames, even if the MAC address is randomized☆33Jul 17, 2020Updated 5 years ago
- Script for querying Google home devices☆11May 27, 2018Updated 7 years ago
- Converts a PCAP file to a PANDAS or SFRAME data frame☆14Apr 19, 2019Updated 6 years ago
- Selective wifi jammer - control who can connect where☆48Sep 12, 2017Updated 8 years ago
- Converts Half-WPA handshake to hashcat☆19Oct 29, 2018Updated 7 years ago
- An attempt to document commonly believed misconceptions about Tor.☆14Jun 15, 2017Updated 8 years ago
- 🚧 Currently transfering TLP:CLEAR rules from TLP:AMBER repository...☆21Mar 22, 2024Updated 2 years ago
- OnSense is a hybrid spectrum sensing scanner using a combination of SDR and conventional receivers.☆13Oct 9, 2013Updated 12 years ago
- IMEI generator used in Huawei modified firmware☆13May 16, 2022Updated 3 years ago
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Feb 26, 2026Updated 3 weeks ago
- Probe Request sniffer + Wigle☆81Feb 17, 2020Updated 6 years ago
- Alex Lynd's portfolio site, using the Doks Hugo theme.☆13Jun 5, 2023Updated 2 years ago
- autoscan - automatic fingerprint of visited networks☆11Nov 2, 2013Updated 12 years ago
- Receive Multiple channels in the bandwidth of an SDR converter (RTL-SDR) optionally recording or streaming to an ICECAST server☆12Sep 11, 2021Updated 4 years ago
- Tensor-based Spectral LDA on Spark☆18Jun 5, 2018Updated 7 years ago
- Passive Spider uses search engines to find interesting information about a target domain.☆13May 29, 2018Updated 7 years ago
- WiFi-Jammer/DoS toolset☆61Jun 8, 2020Updated 5 years ago
- An implementation of the DNS rebinding attack.☆16Apr 14, 2017Updated 8 years ago
- DomainsProject.org HTTP worker☆25Dec 11, 2022Updated 3 years ago
- ☆19Nov 14, 2024Updated last year
- Repository to provide files related to our blog articles.☆16May 26, 2025Updated 9 months ago
- A simple code for detects Host header vulnerability☆12Feb 18, 2020Updated 6 years ago
- This project contains code for comparing or ranking APT capabilities and operational capacity. The metrics are meant to quantify, rank, o…☆35Feb 27, 2019Updated 7 years ago
- A tool for anonymizing webserver logs☆15Apr 23, 2017Updated 8 years ago
- dgplug Summer Training☆11Jul 24, 2023Updated 2 years ago
- Automated Persistence and Lateral Movement using GCP Patch Management☆16Aug 11, 2022Updated 3 years ago
- Creating a Feed of MISP Events from ThreatFox (by abuse.ch)☆19Jun 2, 2021Updated 4 years ago
- Extract resources from a Qt binary☆19Sep 16, 2023Updated 2 years ago
- Easily Expandable Wireless Intrusion Detection System☆30Oct 12, 2020Updated 5 years ago
- A geolocation script for Omegle, Chatroulette and the like☆14Oct 26, 2017Updated 8 years ago
- ☆10Oct 22, 2020Updated 5 years ago
- Open ESP32 RC - Open ESP32 Remote Control☆38Jun 20, 2019Updated 6 years ago
- tx_sdr tool for transmitting data to SDRs using SoapySDR☆53Apr 20, 2024Updated last year
- Sample code for 3rd party developers working on Android On Snapdragon☆12Sep 4, 2024Updated last year
- We store attacks and exploits that we've found useful in our research☆13Jun 4, 2015Updated 10 years ago
- Crowdsourced, inline LLM investigations of the things you're reading.☆40Mar 6, 2026Updated 2 weeks ago
- Threat Hunting at Scale: Auditing Thousands of Clusters With Falco + Fluent☆12Aug 13, 2022Updated 3 years ago
- Basic Linux binary shim method on the passwd binary from the shadow package to steal credentials as they are changed.☆14Nov 14, 2024Updated last year
- ☆19Jul 9, 2022Updated 3 years ago