A phone number can reveal whether a device is active, in standby or offline (and more). This PoC demonstrates how delivery receipts + RTT timing leak sensitive device-activity patterns. (WhatsApp / Signal)
☆4,813Dec 31, 2025Updated 2 months ago
Alternatives and similar repositories for device-activity-tracker
Users that are interested in device-activity-tracker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆44Sep 2, 2025Updated 6 months ago
- Why is this running?☆14,160Mar 19, 2026Updated last week
- OSINT Intelligence Tool☆79Dec 7, 2025Updated 3 months ago
- AI-Powered Dark Web OSINT Tool☆4,544Feb 17, 2026Updated last month
- "DeepTutor: AI-Powered Personalized Learning Assistant"☆10,792Updated this week
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆45Feb 20, 2026Updated last month
- Securely encrypt and decrypt your files directly in your browser.☆94Feb 10, 2026Updated last month
- A professional Red Team / Pentest tool for assessing the external perimeter of a company in a complete "black box" mode (zero knowledge, …☆29Feb 15, 2026Updated last month
- Prevent in-process process termination by patching exit APIs☆65Nov 9, 2025Updated 4 months ago
- π RuView: WiFi DensePose turns commodity WiFi signals into real-time human pose estimation, vital sign monitoring, and presence detection…☆41,544Updated this week
- Autonomous Multi-Agent Based Red Team Testing Service / AI hacker☆931Updated this week
- Shannon Lite is an autonomous, white-box AI pentester for web applications and APIs. It analyzes your source code, identifies attack vect…☆34,126Mar 18, 2026Updated last week
- New 0 day vulnerability allowing to leak NTLM hashes from browsers with one click☆209Nov 18, 2025Updated 4 months ago
- A list of OSINT resources and tools that may be useful to you when conducting investigations related to the Democratic People's Republic …☆36May 1, 2025Updated 10 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Windows Access token manipulation tool made in C#☆24Aug 24, 2025Updated 7 months ago
- ☆44Updated this week
- The Ultimate Information Gathering Toolkit☆3,344Dec 10, 2025Updated 3 months ago
- Get 10X more out of Claude Code, Codex or any coding agent☆23,575Mar 20, 2026Updated last week
- bluetooth mesh chat, IRC vibes☆25,471Updated this week
- Integrate LLM models directly into Ghidra for automated code refactoring and analysis.☆255Dec 16, 2025Updated 3 months ago
- Advanced LLM-powered brute-force tool combining AI intelligence with automated login attacks☆1,395Nov 1, 2025Updated 4 months ago
- Lateral Movement via Bitlocker DCOM interfaces & COM Hijacking☆439Jun 27, 2025Updated 9 months ago
- world's first Opensource fully Autonomous AI Security Engineer☆240Nov 18, 2025Updated 4 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Scan websites for exposed Supabase JWTs, enumerate accessible tables, and detect sensitive data exposure automatically.☆122Dec 29, 2025Updated 2 months ago
- PentestAgent is an AI agent framework for black-box security testing, supporting bug bounty, red-team, and penetration testing workflows.☆1,768Mar 15, 2026Updated last week
- Malicious PixelCode is a security research project that demonstrates a covert technique for encoding executable files into pixel data and…☆163Feb 2, 2026Updated last month
- real time face swap and one-click video deepfake with only a single image☆80,300Updated this week
- Nextjs RCE Exploit Kit☆151Feb 13, 2026Updated last month
- A customizable link page generator☆46Feb 2, 2026Updated last month
- Open-source AI hackers to find and fix your app’s vulnerabilities.☆21,275Updated this week
- A modern platform for visual, flexible, and extensible graph-based investigations. For cybersecurity analysts and investigators.☆2,775Mar 16, 2026Updated last week
- Check if an email address exists without sending any email, written in Rust. Comes with a ⚙️ HTTP backend.☆8,541Mar 17, 2026Updated last week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- OSINT tool for researching targets based on Email Address or Username using SerperDev, Firecrawl, HIBP & OSINT Industries APIs, and OpenA…☆16Sep 17, 2024Updated last year
- badUSB ek0ms style with integrated c2☆50Oct 23, 2025Updated 5 months ago
- Digler is a tool for forensic disk analysis and file recovery. It's designed to help you unearth lost or deleted data from various disk i…☆1,172Oct 9, 2025Updated 5 months ago
- CF-Hero is a reconnaissance tool that uses multiple data sources to discover the origin IP addresses of Cloudflare-protected web applicat…☆1,784Jun 15, 2025Updated 9 months ago
- ☆356Mar 20, 2026Updated last week
- A QGIS plugin for visualizing Maxar Open Data☆77Mar 16, 2026Updated last week
- 🕵️♂️ All-in-one OSINT tool for analysing any website☆32,461Jan 31, 2026Updated last month