RattaGATTa: Scalable Bluetooth Low-Energy Survey Using a pool of collectors to scan and connect to BTLE devices, shedding light on the intricacies of hardware, radio frequency challenges, and the importance of rate-limiting algorithms.
☆46Jan 20, 2025Updated last year
Alternatives and similar repositories for rattagatta
Users that are interested in rattagatta are comparing it to the libraries listed below
Sorting:
- map and spoof remoteid coordinates☆17Mar 8, 2026Updated last week
- Get ready for the World Wide WarDrive, or your next big stumbling adventure!☆14Jul 11, 2024Updated last year
- Uses an ATOM M5 GPS Kit for Wigle wardriving☆34Dec 7, 2025Updated 3 months ago
- An kind of AAT (Airborne - Antenna - Tracking) module for FPV (First - Person - View) UAVs. Aligning the airborne antenna's beam directi…☆16Nov 14, 2024Updated last year
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service, versions and C…☆17Feb 20, 2026Updated last month
- Raspberry Pi 4 Wigle Bottle USB 2 Breakout Board☆14Jul 18, 2022Updated 3 years ago
- ESP32_wroom_32u WarDriver☆15Aug 25, 2023Updated 2 years ago
- 🚀 A powerful multi-platform RF toolbox that deploys specialized radio, hardware, and other security tools in seconds on Linux, Windows, …☆288Mar 13, 2026Updated last week
- Skinny Research and Development LoRa Scanner Utility☆22Oct 28, 2024Updated last year
- OpenDrone ID sniffer/spoofer for Bluetooth + WIFI☆35Feb 2, 2026Updated last month
- Still point in moving world.☆49Oct 6, 2022Updated 3 years ago
- A vet analyzer which checks sql queries for correctness☆10Feb 27, 2019Updated 7 years ago
- Scripting Assembly Language☆12Sep 2, 2015Updated 10 years ago
- This will be a wiki when it grows up, if it grows up☆95Aug 11, 2025Updated 7 months ago
- Tool to perform differential fault analysis attack (DFA) on whiteboxes with external encodings.☆16Feb 10, 2023Updated 3 years ago
- This is a proof of concept for CVE-2024-20356, a Command Injection vulnerability in Cisco's CIMC.☆55Apr 18, 2024Updated last year
- Timestomp Tool to flatten MAC times with a specific timestamp☆50Dec 7, 2025Updated 3 months ago
- low cost software radio platform☆71Aug 9, 2025Updated 7 months ago
- An 802.11 probe request and beacon sniffer.☆14Mar 16, 2021Updated 5 years ago
- A NodeMCU based wifi scanner that logs SSIDs to a text file on a sd card.☆21Oct 1, 2018Updated 7 years ago
- A wardriver based on the ESP32-C5☆86Mar 9, 2026Updated last week
- OpenDrone ID sniffer/spoofer for Bluetooth + WIFI☆89Jan 28, 2026Updated last month
- process hollowing variant using NtCreateSection + NtMapViewOfSection + ResumeThread☆31Jan 9, 2022Updated 4 years ago
- ollvm, based on llvm-clang 5.0.2, 6.0.1, 7.0.1, 8.0, 9.0, 9.0.1☆19Apr 4, 2022Updated 3 years ago
- havoc2nginx is a simple python script that converts Havoc Framework's yaotl malleable c2 profile to Nginx configuration file format. Most…☆12May 8, 2023Updated 2 years ago
- A little tool to filter the stranger strings from a binary so you can analyze the good ones☆54Sep 11, 2025Updated 6 months ago
- Deep learning techniques for 5G NR and 4G LTE signal detection and identification☆16Jun 12, 2025Updated 9 months ago
- ☆11Mar 11, 2016Updated 10 years ago
- LUA dissector plugin generator for Wireshark☆14Oct 17, 2024Updated last year
- ☆10Oct 22, 2020Updated 5 years ago
- Si5351 based antenna analyser using ESP32 or Arduino☆13Oct 22, 2018Updated 7 years ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Feb 6, 2024Updated 2 years ago
- ☆26Jan 7, 2024Updated 2 years ago
- C# Implementation of Get-VaultCredential☆14Jul 31, 2018Updated 7 years ago
- .NET project for writing files to local or remote hosts☆43Jan 27, 2020Updated 6 years ago
- Monarch - The Adversary Emulation Toolkit☆64Jan 7, 2025Updated last year
- Detect Stalkers with Wardriving, using Python☆47Aug 4, 2023Updated 2 years ago
- CoreLocation, netsh, nmcli: scan Wifi from Python on Windows, MacOS, Linux☆15Sep 19, 2024Updated last year
- This module helps you get started with basic Zigbee analysis, and later on performing additional attacks on the Zigbee protocol.☆13Nov 23, 2016Updated 9 years ago