Anonymizes 802.11 Layer 2 information found in capture files (BSSID, SSID, AP name, etc.)
☆30Oct 17, 2023Updated 2 years ago
Alternatives and similar repositories for dot11anonymizer
Users that are interested in dot11anonymizer are comparing it to the libraries listed below
Sorting:
- (ABANDONED) Wi-Fi device profiling script for the WLANPi☆11Apr 12, 2021Updated 4 years ago
- User space agent and eBPF programs that provide INT support to end hosts☆15Jan 20, 2022Updated 4 years ago
- Easy to install plug-in to allow configuration and wireless capture from a WLANPi directly within the Wireshark GUI☆11Mar 7, 2021Updated 5 years ago
- Wireshark extcap interface for remote wireless captures.☆35Feb 3, 2023Updated 3 years ago
- Real-time Authoritative Server Monitoring with passive measurements, based on ENTRADA☆21Mar 18, 2021Updated 4 years ago
- Store 802.11 frames in Elasticsearch. Visualize with Kibana☆59Apr 14, 2024Updated last year
- Utility to run various UX perf tests from an RPi/WLAN Pi and send results to various data repos☆28Dec 5, 2021Updated 4 years ago
- SCTP Load Balancer☆12Updated this week
- Documentation, U-Boot and OpenWRT ports for a low-cost MT02 repeater.☆15Oct 27, 2025Updated 4 months ago
- IPDK Networking Recipe (P4 Control Plane)☆40Mar 2, 2026Updated last week
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago
- Enables support for external USB adapters in WiFi Explorer Pro and Airtool 2.☆42Jun 27, 2025Updated 8 months ago
- pifox - Raspberry Pi Fox Hunt Ham Radio Transmitter☆50Apr 13, 2024Updated last year
- ☆20Feb 25, 2026Updated last week
- ☆11Mar 11, 2016Updated 9 years ago
- ☆15Dec 6, 2025Updated 3 months ago
- ☆12Feb 9, 2026Updated last month
- ☆15Sep 4, 2024Updated last year
- ☆12Aug 17, 2022Updated 3 years ago
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 10 years ago
- mobile international certificate of vaccination☆12Nov 9, 2021Updated 4 years ago
- A SLEIGH processor spec for Ghidra for the Motorola 68HC11 (HC11) microcontroller family.☆20Sep 10, 2024Updated last year
- Scan for AirTag MACs and Payloads without the need for an Android device or nrfConnect.☆16Oct 13, 2025Updated 4 months ago
- ☆10May 30, 2017Updated 8 years ago
- ☆11Sep 8, 2022Updated 3 years ago
- eternalrelayx☆36Jul 10, 2019Updated 6 years ago
- A server and client implementation to demonstrate and test ALG abuse and perform the NAT slipstream attack described https://www.samy.pl/…☆43Dec 8, 2020Updated 5 years ago
- Tool to convert input application into unikernel image☆10Mar 30, 2017Updated 8 years ago
- The P4 version of the Zodiac FX firmware☆10Jul 25, 2019Updated 6 years ago
- Pastenum is a text dump enumeration tool.☆14Dec 9, 2013Updated 12 years ago
- An 802.11 probe request and beacon sniffer.☆14Mar 16, 2021Updated 4 years ago
- This project process eBPF events into Prometheus metrics via a Go user-space application. A Grafana dashboard is included to visualize Ke…☆14Apr 22, 2025Updated 10 months ago
- Simple and clear sample code for Remote Attestation☆11Aug 10, 2024Updated last year
- Proof of concept python script for regreSSHion exploit.☆10Oct 19, 2024Updated last year
- HLS implementation of cuckoo hashing. Refer to paper : https://ieeexplore.ieee.org/document/7577355/☆14Dec 4, 2018Updated 7 years ago
- ☆10Jun 22, 2025Updated 8 months ago
- Making me more antisocial and weird.☆10Oct 6, 2020Updated 5 years ago
- NS3 module for simulating DOCSIS 3.1 links☆16Apr 5, 2024Updated last year
- ☆11Mar 8, 2025Updated last year