Skip to content

h9zdev/WireTapper

πŸ“‘ WireTapper

WireTapper

Note

Wireless OSINT & Signal Intelligence Platform

WireTapper is a wireless OSINT tool designed to discover, map, and analyze radio-based devices using passive signal intelligence. It provides investigators, researchers, and security analysts with real-time visibility into the invisible wireless landscape around them.

WireTapper detects and correlates signals from common wireless technologies, helping users understand what devices exist, where they are likely located, and how they interact, without active intrusion.

πŸ”— Website: https://haybnz.web.app

πŸ”— Blog on WireTapper: Read on Medium

Support My Work

πŸ“Ά Supported Signal Intelligence

WireTapper can identify and analyze signals from:

  • Wi-Fi access points & clients
  • Bluetooth & BLE devices
  • Wireless CCTV / IP cameras
  • Vehicles broadcasting RF signals (infotainment, telemetry, keyless systems)
  • Headphones, wearables, and smart devices
  • Smart TVs & IoT appliances
  • Cell towers & mobile network beacons

πŸ”‘ API Services

WireTapper integrates with several external services to provide intelligence. You will need to obtain API keys from the following:

  • Wigle.net – Wireless network mapping and discovery.
  • OpenCellID – Open-source database of cell towers.
  • Shodan – Search engine for Internet-connected devices.
    • Note: A Premium account is required to use Shodan's API with this tool.

πŸš€ Installation

Follow these steps to get WireTapper up and running:

  1. Clone the repository:

    git clone https://github.com/h9zdev/WireTapper.git
    cd WireTapper
  2. Install dependencies: It is recommended to use a virtual environment.

    pip install -r WireTapper.txt
  3. Configure API Keys and Run:

    Choose one of the following methods to configure your API keys and run the application:

    Method 1: Modify app.py (Direct Configuration)

    Open app.py and manually enter your API keys by replacing the empty strings:

    WIGLE_API_NAME = "your_wigle_api_name"
    WIGLE_API_TOKEN = "your_wigle_api_token"
    OPENCELLID_API_KEY = "your_opencellid_api_key"
    SHODAN_API_KEY = "your_shodan_api_key"

    Then, start the server:

    python app.py

    Method 2: Use app-env.py (Environment Variables)

    This is the recommended approach for better security. You can export your keys in the terminal:

    export WIGLE_API_NAME="your_wigle_api_name"
    export WIGLE_API_TOKEN="your_wigle_api_token"
    export OPENCELLID_API_KEY="your_opencellid_api_key"
    export SHODAN_API_KEY="your_shodan_api_key"

    Alternatively, you can define these keys in a .env file. Then, start the server:

    python app-env.py

    The application will be available at http://localhost:8080/map-w.

πŸ“· Screenshots

WireTapper Image 1
WireTapper Image 2
WireTapper Image 3
WireTapper Image 4
WireTapper Image 5

πŸ“œ License

This project is licensed under the Creative Commons Attribution-NonCommercial 4.0 International (CC BY-NC 4.0) License. See the LICENSE file for more details.

Unauthorized use is strictly prohibited.

πŸ“§ Contact: singularat@protn.me

β˜• Support

Donate via Monero: 45PU6txuLxtFFcVP95qT2xXdg7eZzPsqFfbtZp5HTjLbPquDAugBKNSh1bJ76qmAWNGMBCKk4R1UCYqXxYwYfP2wTggZNhq

πŸ‘₯ Contributors and Developers

haybnzz VaradScript

Star History

Star History Chart

About

WireTapper is a wireless OSINT tool that passively detects and maps Wi-Fi, Bluetooth, CCTV cameras, vehicles, headphones, TVs, IoT devices, and cell towers, turning nearby radio signals into clear situational intelligence πŸ“‘

Resources

License

Code of conduct

Contributing

Security policy

Stars

Watchers

Forks

Sponsor this project

  •  

Packages