Detect defense contractor hardware via Bluetooth and WiFi MAC address filtering. Named after the Greek protest dog.
The impetus for this project was that we realized lots of cops have WiFi and Bluetooth enabled Axon body cams, and that we could probably do proximity cop detection using simple MAC address filtering. After finding the JSON files of defense contractors from https://hackthepolice.pages.gay, we realized the scope could be pretty reasonably expanded to many defense contractors.
MAC addresses are added to the dataset by contributors. We're not done filling out the dataset yet. If you want to add a new company, or add MAC prefixes to an existing company, please put in a pull request.
If you want to know whether your area uses hardware detectable by this program,
check the docs/Find Your Location folder. We use markdown files in the repo
rather than GitHub's wiki function because GitHub does not allow pull requests
for the wiki. If you want a location added, please put in a pull request.
- Basic WiFi capturing using tcpdump
- Improved capture using
pcap - Utilization of multiple wireless interfaces
- Builds for embedded systems (ESP32?)
- Count for number of unique MACs spotted in the last X minutes
- Ability to enable and disable categories for detection
- WiGLE is the most popular wardriving website on the internet. They collect 802.11, bluetooth, and cell data.
- DEF CON 31 - Snoop On To Them, As They Snoop On To Us - Alan Meekins
- rfparty, the app mentioned in this video, appears to no longer be on the google play store. However, its GitHub still exists if you want to build it yourself.