A phone number can reveal whether a device is active, in standby or offline (and more). This PoC demonstrates how delivery receipts + RTT timing leak sensitive device-activity patterns. (WhatsApp / Signal)
☆4,744Dec 31, 2025Updated 2 months ago
Alternatives and similar repositories for device-activity-tracker
Users that are interested in device-activity-tracker are comparing it to the libraries listed below
Sorting:
- Prevent in-process process termination by patching exit APIs☆63Nov 9, 2025Updated 3 months ago
- AI-Powered Dark Web OSINT Tool☆4,375Feb 17, 2026Updated 2 weeks ago
- Securely encrypt and decrypt your files directly in your browser.☆94Feb 10, 2026Updated 3 weeks ago
- A professional Red Team / Pentest tool for assessing the external perimeter of a company in a complete "black box" mode (zero knowledge, …☆29Feb 15, 2026Updated 2 weeks ago
- OSINT Intelligence Tool☆64Dec 7, 2025Updated 3 months ago
- Windows Access token manipulation tool made in C#☆24Aug 24, 2025Updated 6 months ago
- Autonomous Multi-Agent Based Red Team Testing Service / AI hacker☆887Feb 25, 2026Updated last week
- Fully autonomous AI hacker to find actual exploits in your web apps. Shannon has achieved a 96.15% success rate on the hint-free, source-…☆25,799Feb 24, 2026Updated last week
- π RuView: WiFi DensePose turns commodity WiFi signals into real-time human pose estimation, vital sign monitoring, and presence detection…☆27,487Updated this week
- Nextjs RCE Exploit Kit☆154Feb 13, 2026Updated 3 weeks ago
- ☆45Feb 20, 2026Updated 2 weeks ago
- New 0 day vulnerability allowing to leak NTLM hashes from browsers with one click☆208Nov 18, 2025Updated 3 months ago
- ☆11Dec 19, 2024Updated last year
- The instant digital "Do Not Touch" sign for your Mac. Stop fingerprints and protect your expensive display with one keystroke.☆29Jan 13, 2026Updated last month
- CF-Hero is a reconnaissance tool that uses multiple data sources to discover the origin IP addresses of Cloudflare-protected web applicat…☆1,782Jun 15, 2025Updated 8 months ago
- Integrate LLM models directly into Ghidra for automated code refactoring and analysis.☆246Dec 16, 2025Updated 2 months ago
- Open-source AI hackers to find and fix your app’s vulnerabilities.☆20,720Updated this week
- Lateral Movement via Bitlocker DCOM interfaces & COM Hijacking☆438Jun 27, 2025Updated 8 months ago
- A modern platform for visual, flexible, and extensible graph-based investigations. For cybersecurity analysts and investigators.☆2,617Updated this week
- CVE-2025-59501 POC code☆25Nov 20, 2025Updated 3 months ago
- OSINT tool for researching targets based on Email Address or Username using SerperDev, Firecrawl, HIBP & OSINT Industries APIs, and OpenA…☆16Sep 17, 2024Updated last year
- real time face swap and one-click video deepfake with only a single image☆79,811Updated this week
- A portable C# utility for enumerating local and remote windows sessions☆56Jan 1, 2026Updated 2 months ago
- ☆351Updated this week
- This repository contains tutorials and tools for working with IP search engines. Search engines that search all devices connected to the …☆313Aug 27, 2025Updated 6 months ago
- 🕵️♂️ All-in-one OSINT tool for analysing any website☆32,185Jan 31, 2026Updated last month
- A list of articles, videos, and tools related to the use of AI for OSINT.☆205Nov 17, 2025Updated 3 months ago
- PentestAgent is an AI agent framework for black-box security testing, supporting bug bounty, red-team, and penetration testing workflows.☆1,694Feb 25, 2026Updated last week
- Digler is a tool for forensic disk analysis and file recovery. It's designed to help you unearth lost or deleted data from various disk i…☆1,160Oct 9, 2025Updated 4 months ago
- A QGIS plugin for visualizing Maxar Open Data☆74Updated this week
- The Ultimate Information Gathering Toolkit☆3,273Dec 10, 2025Updated 2 months ago
- User-mode implementation of HTTP.SYS. Implements HTTP 1.1 of the "HTTP Server API 2.0" for web servers☆45Feb 17, 2025Updated last year
- ☆43Updated this week
- Track the GPS location of the user's smartphone or PC and capture a picture of the target, along with IP and device information.☆1,295Jan 6, 2026Updated 2 months ago
- Using Chromium-based browsers as a proxy for C2 traffic.☆146Dec 6, 2025Updated 3 months ago
- Scan websites for exposed Supabase JWTs, enumerate accessible tables, and detect sensitive data exposure automatically.☆120Dec 29, 2025Updated 2 months ago
- All sorts of controllers managing the EdgeCDN-X Ecosystem☆23Feb 26, 2026Updated last week
- PoC that downloads an executable from a public SSL certificate☆136Jul 27, 2025Updated 7 months ago
- Get 10X more out of Claude Code, Codex or any coding agent☆22,174Updated this week