Wi-Fi Surveying: wardriving, datasets, statistics, tools, and more.
☆16Oct 10, 2023Updated 2 years ago
Alternatives and similar repositories for wifi-surveying
Users that are interested in wifi-surveying are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆16Aug 20, 2017Updated 8 years ago
- Wi-Fi MFP Deauthentication: proof-of-concepts, security patches, and more.☆33Apr 15, 2023Updated 2 years ago
- Wi-Fi Fine Timing Measurement: tutorials, hardware support, adoption rates, security and privacy research, and more.☆48Jan 1, 2024Updated 2 years ago
- Masquerade NAT in C☆19Apr 12, 2023Updated 2 years ago
- Code for the AsiaCCS 2017 paper "Discovering Logical Vulnerabilities in the Wi-Fi Handshake using Model-Based Testing".☆13Oct 12, 2018Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆26Jun 25, 2017Updated 8 years ago
- 🧮 SpeedCrunch-style scientific calculator in the browser☆11Nov 2, 2025Updated 4 months ago
- Python to analyse bitcoin blockchain, chainstate, blockindex, mempool etc☆11Jun 18, 2019Updated 6 years ago
- MATLAB function to fill an area with hatching ~~or speckling~~☆11Mar 4, 2018Updated 8 years ago
- Some crazy experiments about using a FPGA to transmit a TV signal old-style☆13Oct 13, 2018Updated 7 years ago
- Estimates the uniqueness of a device based on the content of its emitted Wi-Fi frames, even if the MAC address is randomized☆33Jul 17, 2020Updated 5 years ago
- Based on the original webgpsmap plugin, f0xtr0t is an enhanced version that gives you an interfaced optimized for wardriving.☆32Feb 9, 2022Updated 4 years ago
- some kernel exploit challenges and cve analysis☆26Nov 30, 2018Updated 7 years ago
- GitHub mirror of the SELinux kernel repository☆14Mar 23, 2026Updated last week
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Toolkit for creating exams for the Abitti exam system☆16Mar 23, 2026Updated last week
- Wi-Fi Framework for creating proof-of-concepts, automated experiments, test suites, fuzzers, and more.☆252Apr 18, 2025Updated 11 months ago
- The source code for (BEP-20) SIM coin.☆11Feb 23, 2023Updated 3 years ago
- tinydb 是用 Python 实现的一个很精巧的 nosql 数据库. 源码值得注解.☆10Sep 13, 2016Updated 9 years ago
- Android app for tracking your locations and uploading them on your private server☆11Jul 1, 2017Updated 8 years ago
- Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, a…☆10Sep 15, 2022Updated 3 years ago
- Recon Automation☆11Sep 14, 2024Updated last year
- ☆47Jan 25, 2024Updated 2 years ago
- Basic ESP8266/ESP32 Wardriving & Logging in WiGLE Format☆53Feb 14, 2024Updated 2 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Files for generating a C# source file that allows for memory-mapping "niceness" and then executing said "niceness"☆31Feb 28, 2019Updated 7 years ago
- Single-Clich-Proxy-Chains☆13Mar 29, 2021Updated 5 years ago
- bash script to automate wardriving tasks. (Wi-Fi & Bluetooth)☆11Feb 14, 2023Updated 3 years ago
- 🌈 Automatic Color Pop effect on any image inspired by Google Photos☆27Mar 3, 2023Updated 3 years ago
- Utilities for the Analysis of Ethereum Smart Contracts☆14Jul 26, 2025Updated 8 months ago
- RF front end for a software defined receiver☆12May 31, 2025Updated 9 months ago
- Mirror of upstream Gerrit repo☆17Mar 5, 2026Updated 3 weeks ago
- A Julia Library for Outlier Detection (Anomaly Detection)☆11Sep 1, 2018Updated 7 years ago
- Ready made firmware file for TPLink TL-MR3020 router for using extroot☆12Nov 8, 2015Updated 10 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Threat Detection Rules (Snort/Sigma/Yara)☆14Jan 23, 2024Updated 2 years ago
- Manage your Android phone from a Linux computer. File transfer, file browsing and in-place editing, screen control, tethering, reverse te…☆19Jan 13, 2025Updated last year
- Visualize Wi-Fi signal strength over a geographic area☆65Mar 20, 2026Updated last week
- Nim project template.☆12Sep 3, 2024Updated last year
- Script from the paper generating encrypted network. Dataset☆11Sep 1, 2021Updated 4 years ago
- 🧪 Homepage for Testausserveri - community of young Finnish hackers☆13Feb 12, 2026Updated last month
- Snooze - Log aggregation and alerting☆10Sep 19, 2025Updated 6 months ago