A phone number can reveal whether a device is active, in standby or offline (and more). This PoC demonstrates how delivery receipts + RTT timing leak sensitive device-activity patterns. (WhatsApp / Signal)
☆4,940Dec 31, 2025Updated 4 months ago
Alternatives and similar repositories for device-activity-tracker
Users that are interested in device-activity-tracker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Why is this running?☆14,919Mar 19, 2026Updated last month
- Securely encrypt and decrypt your files directly in your browser.☆97Feb 10, 2026Updated 2 months ago
- AI-Powered Dark Web OSINT Tool☆4,936Mar 31, 2026Updated last month
- ☆48Feb 20, 2026Updated 2 months ago
- OSINT Intelligence Tool☆85Dec 7, 2025Updated 5 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- [TESTING]: Intelligent YouTube playback speed control using AI. Automatically speeds up during silence and slows down during speech. Full…☆39Sep 5, 2025Updated 8 months ago
- A professional Red Team / Pentest tool for assessing the external perimeter of a company in a complete "black box" mode (zero knowledge, …☆30Feb 15, 2026Updated 2 months ago
- Shannon Lite is an autonomous, white-box AI pentester for web applications and APIs. It analyzes your source code, identifies attack vect…☆41,481Updated this week
- π RuView turns commodity WiFi signals into real-time spatial intelligence, vital sign monitoring, and presence detection — all without a …☆51,694May 3, 2026Updated last week
- "DeepTutor: Agent-Native Personalized Learning Assistant"☆23,695Updated this week
- New 0 day vulnerability allowing to leak NTLM hashes from browsers with one click☆210Nov 18, 2025Updated 5 months ago
- Get 10X more out of Claude Code, Codex or any coding agent☆26,089Apr 24, 2026Updated 2 weeks ago
- Integrate LLM models directly into Ghidra for automated code refactoring and analysis.☆259Dec 16, 2025Updated 4 months ago
- A list of OSINT resources and tools that may be useful to you when conducting investigations related to the Democratic People's Republic …☆36May 1, 2025Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Windows Access token manipulation tool made in C#☆25Aug 24, 2025Updated 8 months ago
- Advanced LLM-powered brute-force tool combining AI intelligence with automated login attacks☆1,414Nov 1, 2025Updated 6 months ago
- OSINT tools for Information gathering, Cybersecurity, Reverse searching, bugbounty, trust and safety, red team oprations and more.☆3,236Apr 23, 2026Updated 2 weeks ago
- Digler is a tool for forensic disk analysis and file recovery. It's designed to help you unearth lost or deleted data from various disk i…☆1,198Apr 1, 2026Updated last month
- The Ultimate Information Gathering Toolkit☆3,498Dec 10, 2025Updated 5 months ago
- bluetooth mesh chat, IRC vibes☆25,784May 3, 2026Updated last week
- ☆44Mar 30, 2026Updated last month
- Open-source AI hackers to find and fix your app’s vulnerabilities.☆24,804Updated this week
- real time face swap and one-click video deepfake with only a single image☆92,602Apr 29, 2026Updated last week
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Lateral Movement via Bitlocker DCOM interfaces & COM Hijacking☆440Jun 27, 2025Updated 10 months ago
- world's first Opensource fully Autonomous AI Security Engineer☆241Nov 18, 2025Updated 5 months ago
- Free open-source information gathering☆13Mar 20, 2023Updated 3 years ago
- Scan websites for exposed Supabase JWTs, enumerate accessible tables, and detect sensitive data exposure automatically.☆124Dec 29, 2025Updated 4 months ago
- Nextjs RCE Exploit Kit☆148Feb 13, 2026Updated 2 months ago
- PentestAgent is an AI agent framework for black-box security testing, supporting bug bounty, red-team, and penetration testing workflows.☆2,252Updated this week
- 🕵️♂️ All-in-one OSINT tool for analysing any website☆32,990Apr 20, 2026Updated 2 weeks ago
- Malicious PixelCode is a security research project that demonstrates a covert technique for encoding executable files into pixel data and…☆165Feb 2, 2026Updated 3 months ago
- CF-Hero is a reconnaissance tool that uses multiple data sources to discover the origin IP addresses of Cloudflare-protected web applicat…☆1,793Jun 15, 2025Updated 10 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- 🛜 ESPectre 👻 - Motion detection system based on Wi-Fi spectre analysis (CSI), with Home Assistant integration.☆7,221Updated this week
- A QGIS plugin for visualizing Maxar Open Data☆80Apr 26, 2026Updated 2 weeks ago
- Track the GPS location of the user's smartphone or PC and capture a picture of the target, along with IP and device information.☆1,352Jan 6, 2026Updated 4 months ago
- Useful tool to track location or mobile number☆12,956Jan 11, 2024Updated 2 years ago
- Cybersecurity AI (CAI), the framework for AI Security☆8,447Apr 20, 2026Updated 2 weeks ago
- 𝐒𝐞𝐚𝐫𝐜𝐡 𝐏𝐡𝐨𝐧𝐞 is a tool for looking up linked phone number information, which uses the Phone Number Analyzer API from the RAPID…☆215Nov 12, 2024Updated last year
- Venom C2 is a dependency‑free Python3 Command & Control framework for redteam persistence☆432Nov 7, 2025Updated 6 months ago