A Python tool for mapping and tracking WiFi networks and devices through raw 802.11 monitoring, similar to nmap for wireless networks.
Trackerjacker is a wireless network reconnaissance tool that passively monitors 802.11 traffic to map nearby WiFi networks and track connected devices. It functions like nmap for wireless networks, allowing users to discover networks, identify devices, and monitor traffic patterns without connecting to the networks. The tool helps solve problems like identifying bandwidth hogs, detecting unauthorized devices, and automating responses to specific network events.
Network security professionals, penetration testers, and system administrators who need to analyze wireless network activity, monitor device presence, or perform wireless reconnaissance in controlled environments.
Developers choose Trackerjacker for its passive monitoring approach, detailed network mapping capabilities, and extensible plugin system that allows custom automation based on network events, all without requiring active network connections.
Like nmap for mapping wifi networks you're not connected to, plus device tracking
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Discovers all nearby WiFi networks and enumerates connected devices without connecting, outputting structured YAML data for easy scripting and analysis, as shown in the example wifi_map.yaml.
Monitors specific MAC addresses with configurable byte thresholds and triggers alerts or custom actions, such as running scripts when thresholds are exceeded, demonstrated in track mode examples.
Supports custom Python plugins for automating responses to network events, allowing users to write scripts for tasks like alerting on new device appearances, with examples provided in the README.
Includes a foxhunt mode with a real-time curses interface displaying device power levels and vendor information, useful for signal triangulation and physical device location.
Officially tested only on Linux with macOS in pre-alpha state, making it unreliable for Windows users or production environments on non-Linux systems.
Requires specific wireless adapters that support monitor mode, as listed in the 'Recommended hardware' section, which can be a barrier for users with unsupported hardware.
Lacks key penetration testing features like deauthentication attacks ('Jack' mode is on the roadmap but not implemented), reducing its utility for active security assessments.