futurice / whereareyouView external linksLinks
Passive indoor localization using WiFi signal strength
☆87Mar 28, 2017Updated 8 years ago
Alternatives and similar repositories for whereareyou
Users that are interested in whereareyou are comparing it to the libraries listed below
Sorting:
- Metasploit_postgresql_database_connection_fix☆12Jan 30, 2019Updated 7 years ago
- An BLE scanner application for ESP32 that publishes all detected BLE devices using MQTT.☆115Jun 16, 2019Updated 6 years ago
- Short Python script that attempts to neuter USB Rubber Duckies.☆12Jun 25, 2019Updated 6 years ago
- Collecting, processing and presenting information about WiFi access points and their geolocation. A versatile wardriving command center.☆15Feb 7, 2026Updated last week
- Hack conventional scales to connect to computer via usb serial and/or bluetooth☆16Feb 18, 2020Updated 5 years ago
- Capstone: Keylogger Trojan☆34Jun 15, 2018Updated 7 years ago
- Scripts and tools for ISM hacking☆16Mar 25, 2018Updated 7 years ago
- CLI Tool for managing vmail databases☆15Sep 5, 2021Updated 4 years ago
- Carl music box☆24Aug 2, 2023Updated 2 years ago
- Firmware Reversing Repo :p☆17Oct 11, 2015Updated 10 years ago
- Guetzling is a simple script for macOS and Linux written in Bash, to automate (recursively finding files) the compression of jpegs using …☆20May 5, 2017Updated 8 years ago
- aircrack-ng gui 2019☆20Oct 30, 2018Updated 7 years ago
- An Instagram account creator☆12Nov 6, 2015Updated 10 years ago
- Scan for giveaways of fake Mobile Base Stations to detect them.☆21May 19, 2016Updated 9 years ago
- Low-cost iBeacon using Raspberry Pi☆47Oct 17, 2021Updated 4 years ago
- Interactive Arts 1; Installation & Immersive Environments - course repo. University of Montana, School of Media Arts☆14Aug 24, 2020Updated 5 years ago
- BLE Beacon tracker on ESP32, sending data through☆21Dec 11, 2017Updated 8 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆26Jan 29, 2018Updated 8 years ago
- ☆12May 13, 2020Updated 5 years ago
- Phishing can't get any easier with Tilapia☆11Jan 2, 2023Updated 3 years ago
- ☆16Jul 28, 2020Updated 5 years ago
- A nefarious keylogger for Ubuntu. Encrypts keylogs and uploads to pastebin.☆27May 1, 2017Updated 8 years ago
- collection of random files☆31Jan 3, 2024Updated 2 years ago
- Turn your Raspberry Pi into Tor tunneled Wifi Access Point☆28Aug 7, 2019Updated 6 years ago
- This is a Python implementation of a raw TCP/IP protocol stack☆29May 2, 2014Updated 11 years ago
- SecureX is an Elixir Library To Handle User Roles and Permissions.☆12Jul 20, 2023Updated 2 years ago
- FE-511 Bloomberg Terminal and Thomson Reuters☆11Feb 8, 2017Updated 9 years ago
- WiFi Attacking Application With User Interface☆11Dec 11, 2022Updated 3 years ago
- KINS Banking Trojan☆65Feb 25, 2015Updated 10 years ago
- Sort photos by day based on the date in the exif data.☆32Jan 26, 2020Updated 6 years ago
- Smart pentesting toolkit for modern WPA/WPA2 networks ⚔️📡☆27Jun 19, 2020Updated 5 years ago
- USB armory - hardware control tool☆34Aug 27, 2025Updated 5 months ago
- ⛷ A collection of hacker scripts.☆28Jan 24, 2017Updated 9 years ago
- Samba (SMB) on Docker. Easy to convert from bare metal installation.☆26Aug 30, 2022Updated 3 years ago
- Instagram follower bot☆31Jun 9, 2019Updated 6 years ago
- A project for visualizing and sending rgb data to leds in 3D arrays. Arbitrary arrangements of led strips can be set up with SOP geometry…☆37Oct 9, 2019Updated 6 years ago
- Dump brush images from Photoshop ABRs☆35Jul 25, 2019Updated 6 years ago
- Python script for decrypting stored images from Snapchat version 5.0.34.nn☆245Jul 20, 2021Updated 4 years ago
- This Arduino sketch is used to control 2 DC motors and 2 optical encoders from printer head frame by step/ direction signals.☆12Sep 27, 2020Updated 5 years ago