A phone number can reveal whether a device is active, in standby or offline (and more). This PoC demonstrates how delivery receipts + RTT timing leak sensitive device-activity patterns. (WhatsApp / Signal)
☆4,852Dec 31, 2025Updated 3 months ago
Alternatives and similar repositories for device-activity-tracker
Users that are interested in device-activity-tracker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Why is this running?☆14,287Mar 19, 2026Updated last month
- AI-Powered Dark Web OSINT Tool☆4,726Mar 31, 2026Updated 2 weeks ago
- OSINT Intelligence Tool☆82Dec 7, 2025Updated 4 months ago
- ☆48Feb 20, 2026Updated last month
- A professional Red Team / Pentest tool for assessing the external perimeter of a company in a complete "black box" mode (zero knowledge, …☆30Feb 15, 2026Updated 2 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Securely encrypt and decrypt your files directly in your browser.☆97Feb 10, 2026Updated 2 months ago
- π RuView: WiFi DensePose turns commodity WiFi signals into real-time human pose estimation, vital sign monitoring, and presence detection…☆46,698Updated this week
- Shannon Lite is an autonomous, white-box AI pentester for web applications and APIs. It analyzes your source code, identifies attack vect…☆38,491Updated this week
- New 0 day vulnerability allowing to leak NTLM hashes from browsers with one click☆208Nov 18, 2025Updated 5 months ago
- A list of OSINT resources and tools that may be useful to you when conducting investigations related to the Democratic People's Republic …☆36May 1, 2025Updated 11 months ago
- Windows Access token manipulation tool made in C#☆25Aug 24, 2025Updated 7 months ago
- ☆44Mar 30, 2026Updated 2 weeks ago
- The Ultimate Information Gathering Toolkit☆3,449Dec 10, 2025Updated 4 months ago
- bluetooth mesh chat, IRC vibes☆25,704Apr 12, 2026Updated last week
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Get 10X more out of Claude Code, Codex or any coding agent☆25,244Updated this week
- Lateral Movement via Bitlocker DCOM interfaces & COM Hijacking☆439Jun 27, 2025Updated 9 months ago
- Advanced LLM-powered brute-force tool combining AI intelligence with automated login attacks☆1,407Nov 1, 2025Updated 5 months ago
- world's first Opensource fully Autonomous AI Security Engineer☆241Nov 18, 2025Updated 5 months ago
- Integrate LLM models directly into Ghidra for automated code refactoring and analysis.☆257Dec 16, 2025Updated 4 months ago
- Scan websites for exposed Supabase JWTs, enumerate accessible tables, and detect sensitive data exposure automatically.☆124Dec 29, 2025Updated 3 months ago
- Open-source AI hackers to find and fix your app’s vulnerabilities.☆23,640Updated this week
- Malicious PixelCode is a security research project that demonstrates a covert technique for encoding executable files into pixel data and…☆164Feb 2, 2026Updated 2 months ago
- real time face swap and one-click video deepfake with only a single image☆90,489Updated this week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Nextjs RCE Exploit Kit☆148Feb 13, 2026Updated 2 months ago
- A customizable link page generator☆46Feb 2, 2026Updated 2 months ago
- CF-Hero is a reconnaissance tool that uses multiple data sources to discover the origin IP addresses of Cloudflare-protected web applicat…☆1,788Jun 15, 2025Updated 10 months ago
- PentestAgent is an AI agent framework for black-box security testing, supporting bug bounty, red-team, and penetration testing workflows.☆2,019Apr 12, 2026Updated last week
- Digler is a tool for forensic disk analysis and file recovery. It's designed to help you unearth lost or deleted data from various disk i…☆1,185Apr 1, 2026Updated 2 weeks ago
- OSINT tools for Information gathering, Cybersecurity, Reverse searching, bugbounty, trust and safety, red team oprations and more.☆2,946Apr 11, 2026Updated last week
- A QGIS plugin for visualizing Maxar Open Data☆79Mar 16, 2026Updated last month
- 🕵️♂️ All-in-one OSINT tool for analysing any website☆32,780Apr 8, 2026Updated last week
- Track the GPS location of the user's smartphone or PC and capture a picture of the target, along with IP and device information.☆1,334Jan 6, 2026Updated 3 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A modern platform for visual, flexible, and extensible graph-based investigations. For cybersecurity analysts and investigators.☆3,063Apr 11, 2026Updated last week
- Venom C2 is a dependency‑free Python3 Command & Control framework for redteam persistence☆430Nov 7, 2025Updated 5 months ago
- 𝐒𝐞𝐚𝐫𝐜𝐡 𝐏𝐡𝐨𝐧𝐞 is a tool for looking up linked phone number information, which uses the Phone Number Analyzer API from the RAPID…☆213Nov 12, 2024Updated last year
- ☆382Apr 8, 2026Updated last week
- Inboxfuscation is an advanced offensive & defensive framework for mailbox rule obfuscation and detection in Exchange environments.☆83Sep 11, 2025Updated 7 months ago
- Autonomous Hacking Agent for Red Team Testing☆2,102Updated this week
- Medium Unlocker is an android app designed to access Medium articles without any paywalls.☆1,355Mar 28, 2026Updated 3 weeks ago