gigaryte / bssid-geolocatorLinks
☆130Updated 3 months ago
Alternatives and similar repositories for bssid-geolocator
Users that are interested in bssid-geolocator are comparing it to the libraries listed below
Sorting:
- ✈️ A device that detects for aircraft spoofing by monitoring for malicious ADS-B signals in the 1090MHz frequency. Built using a Raspberr…☆221Updated last year
- Bash script to automate setup of Linux router useful for IoT device traffic analysis and SSL mitm☆438Updated 3 weeks ago
- Distributed Signal Intelligence Platform☆119Updated this week
- DroneXtract is a digital forensics suite for DJI drones 🔍. Analyze sensor values, visualize flight maps, and audit for criminal activit…☆316Updated 2 years ago
- Wireless Hacking Devices Protocol client☆241Updated this week
- A sniffer for Bluetooth 5 and 4.x LE☆98Updated last week
- 🚀 A powerful multi-platform RF toolbox that deploys specialized radio tools in seconds on Linux, Windows, and macOS—supporting x86_64, A…☆248Updated this week
- RattaGATTa: Scalable Bluetooth Low-Energy Survey Using a pool of collectors to scan and connect to BTLE devices, shedding light on the in…☆42Updated 8 months ago
- The blue-merle package enhances anonymity and reduces forensic traceability of the GL-E750 Mudi 4G mobile wi-fi router☆352Updated 3 months ago
- RF-modulated high fidelity laser microphone and keystroke sniffer☆77Updated 11 months ago
- A 5G Sniffer and Downlink Injector Framework on steroids... And yes, Wireshark supported!!!☆234Updated 2 weeks ago
- An Open-Source Door Simulator for RFID/PACS Training☆133Updated 11 months ago
- Scans for BLE devices and if it see any from Taser International sets an home assistant switch to 'on', turns back off a minute after the…☆134Updated last year
- Log ALPR data using a Motorola vulnerability☆82Updated 8 months ago
- Enabling Geographically Decoupled Measurements in Cellular Networks☆75Updated 3 weeks ago
- The Tick is the next evolution in covert access control system implants for simulating adversary-in-the-middle attacks.☆154Updated last month
- iOS WarDragon Utility App☆88Updated last week
- SDR-based Jamming using GNU Radio☆165Updated last year
- Scapy sockets to communicate with Bluetooth controllers☆14Updated 2 weeks ago
- its like a tricorder, for your wireless world.☆114Updated last year
- CellGuard is a research project that analyzes how cellular networks are operated and possibly surveilled☆134Updated last month
- Multi-headed 802.11 panopticon☆230Updated 10 months ago
- Drive-by data exfiltration using open WiFi networks & DNS requests☆157Updated last year
- A reconnaissance tool for capturing and displaying SSIDs from device's Preferred Network List.☆163Updated 2 months ago
- Damn Vulnerable Drone is an intentionally vulnerable drone hacking simulator based on the popular ArduPilot/MAVLink architecture, providi…☆300Updated 3 weeks ago
- BLE pentesting scripts☆75Updated 3 years ago
- OpenDrone ID sniffer/spoofer for Bluetooth + WIFI☆68Updated last week
- Toolkit for assessing LoRaWAN network security☆26Updated last week
- ☆28Updated last year
- A software SIM card.☆351Updated last year