mirror of
https://github.com/smittix/intercept.git
synced 2026-04-24 22:59:59 -07:00
- Add GPS dongle support with NMEA parsing (utils/gps.py, routes/gps.py) - Add GPS device selector to ADS-B and Satellite observer location sections - Add GPS dongle option to ADS-B dashboard - Fix Python 3.7/3.8 compatibility by adding 'from __future__ import annotations' to all SDR module files (fixes TypeError: 'type' object is not subscriptable) - Add pyserial to requirements.txt - Update README with GPS dongle documentation and troubleshooting 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
528 lines
21 KiB
Markdown
528 lines
21 KiB
Markdown
# INTERCEPT
|
|
|
|
<p align="center">
|
|
<img src="https://img.shields.io/badge/python-3.7+-blue.svg" alt="Python 3.7+">
|
|
<img src="https://img.shields.io/badge/license-MIT-green.svg" alt="MIT License">
|
|
<img src="https://img.shields.io/badge/platform-macOS%20%7C%20Linux-lightgrey.svg" alt="Platform">
|
|
<img src="https://img.shields.io/badge/author-smittix-cyan.svg" alt="Author">
|
|
</p>
|
|
|
|
<p align="center">
|
|
<strong>Signal Intelligence Platform</strong>
|
|
</p>
|
|
|
|
<p align="center">
|
|
A sleek, modern web-based front-end for signal intelligence tools.<br>
|
|
Unified interface for pager decoding, 433MHz sensors, ADS-B aircraft tracking, satellite monitoring, WiFi reconnaissance, and Bluetooth scanning.
|
|
</p>
|
|
|
|
## Screenshot
|
|
<img src="screenshot2.png">
|
|
|
|
---
|
|
|
|
## Quick Start
|
|
|
|
```bash
|
|
# Clone and install
|
|
git clone https://github.com/smittix/intercept.git
|
|
cd intercept
|
|
pip install -r requirements.txt
|
|
|
|
# Run (sudo recommended for full functionality)
|
|
sudo python3 intercept.py
|
|
```
|
|
|
|
Open `http://localhost:5050` in your browser. See [Installation](#installation) for external tool setup.
|
|
|
|
---
|
|
|
|
## Quick Start WITH UV
|
|
|
|
```bash
|
|
# Clone and install
|
|
git clone https://github.com/smittix/intercept.git
|
|
cd intercept
|
|
uv venv --python 3.11.12 # Or your Python version
|
|
.venv\Scripts\activate
|
|
uv sync
|
|
|
|
# Run (sudo recommended for full functionality)
|
|
sudo python3 intercept.py
|
|
```
|
|
|
|
Open `http://localhost:5050` in your browser. See [Installation](#installation) for external tool setup.
|
|
|
|
---
|
|
|
|
## What is INTERCEPT?
|
|
|
|
INTERCEPT is a **web-based front-end** that provides a unified, modern interface for signal intelligence tools:
|
|
|
|
- **rtl_fm + multimon-ng** - For decoding POCSAG and FLEX pager signals
|
|
- **rtl_433** - For decoding 433MHz ISM band devices (weather stations, sensors, etc.)
|
|
- **dump1090 / rtl_adsb** - For ADS-B aircraft tracking with real-time map visualization
|
|
- **Satellite tracking** - Pass prediction and Iridium burst detection using TLE data
|
|
- **aircrack-ng** - For WiFi reconnaissance and network analysis
|
|
- **hcitool / bluetoothctl** - For Bluetooth device scanning and tracking
|
|
|
|
Instead of running command-line tools manually, INTERCEPT handles the process management, output parsing, and presents decoded data in a clean, real-time web interface.
|
|
|
|
---
|
|
|
|
## AI Use
|
|
|
|
This project was built with the help of AI — as a tool, not a shortcut.
|
|
I spent significant time reviewing, fixing, testing, and validating the code to ensure it works as intended.
|
|
|
|
This started as a personal project and was released to help more people get into **Software Defined Radio** by lowering the barrier to entry.
|
|
|
|
AI is no different from using a power tool instead of a hand screwdriver: it helps you work faster, not care less. What matters is that the software works, solves a real problem, and is open for others to learn from and improve.
|
|
|
|
---
|
|
|
|
## Features
|
|
|
|
### 📟 Pager Decoding
|
|
- **Real-time decoding** of POCSAG (512/1200/2400) and FLEX protocols
|
|
- **Customizable frequency presets** stored in browser
|
|
- **Auto-restart** on frequency change while decoding
|
|
|
|
### 📡 433MHz Sensor Decoding
|
|
- **200+ device protocols** supported via rtl_433
|
|
- **Weather stations** - temperature, humidity, wind, rain
|
|
- **TPMS** - Tire pressure monitoring sensors
|
|
- **Doorbells, remotes, and IoT devices**
|
|
- **Smart meters** and utility monitors
|
|
|
|
### ✈️ ADS-B Aircraft Tracking
|
|
- **Real-time aircraft tracking** via dump1090 or rtl_adsb
|
|
- **Full-screen dashboard** - dedicated popout with virtual radar scope
|
|
- **Interactive Leaflet map** with OpenStreetMap tiles (dark-themed)
|
|
- **Aircraft trails** - optional flight path history visualization
|
|
- **Range rings** - distance reference circles from observer position
|
|
- **Aircraft filtering** - show all, military only, civil only, or emergency only
|
|
- **Marker clustering** - group nearby aircraft at lower zoom levels
|
|
- **Reception statistics** - max range, message rate, busiest hour, total seen
|
|
- **Observer location** - manual input or GPS geolocation
|
|
- **Audio alerts** - notifications for military and emergency aircraft
|
|
- **Emergency squawk highlighting** - visual alerts for 7500/7600/7700
|
|
- **Aircraft details popup** - callsign, altitude, speed, heading, squawk, ICAO
|
|
|
|
### 🛰️ Satellite Tracking
|
|
- **Full-screen dashboard** - dedicated popout with polar plot and ground track
|
|
- **Polar sky plot** - real-time satellite positions on azimuth/elevation display
|
|
- **Ground track map** - satellite orbit path with past/future trajectory
|
|
- **Pass prediction** for satellites using TLE data
|
|
- **Add satellites** via manual TLE entry or Celestrak import
|
|
- **Celestrak integration** - fetch by category (Amateur, Weather, ISS, Starlink, etc.)
|
|
- **Next pass countdown** - time remaining, visibility duration, max elevation
|
|
- **Telemetry panel** - real-time azimuth, elevation, range, velocity
|
|
- **Iridium burst detection** monitoring (demo mode)
|
|
- **Multiple satellite tracking** simultaneously
|
|
|
|
### 📶 WiFi Reconnaissance
|
|
- **Monitor mode** management via airmon-ng
|
|
- **Network scanning** with airodump-ng and channel hopping
|
|
- **Handshake capture** with real-time status and auto-detection
|
|
- **Deauthentication attacks** for authorized testing
|
|
- **Channel utilization** visualization (2.4GHz and 5GHz)
|
|
- **Security overview** chart and real-time radar display
|
|
- **Client vendor lookup** via OUI database
|
|
- **Drone detection** - automatic detection via SSID patterns and OUI (DJI, Parrot, Autel, etc.)
|
|
- **Rogue AP detection** - alerts for same SSID on multiple BSSIDs
|
|
- **Signal history graph** - track signal strength over time for any device
|
|
- **Network topology** - visual map of APs and connected clients
|
|
- **Channel recommendation** - optimal channel suggestions based on congestion
|
|
- **Hidden SSID revealer** - captures hidden networks from probe requests
|
|
- **Client probe analysis** - privacy leak detection from probe requests
|
|
- **Device correlation** - matches WiFi and Bluetooth devices by manufacturer
|
|
|
|
### 🔵 Bluetooth Scanning
|
|
- **BLE and Classic** Bluetooth device scanning
|
|
- **Multiple scan modes** - hcitool, bluetoothctl
|
|
- **Tracker detection** - AirTag, Tile, Samsung SmartTag, Chipolo
|
|
- **Device classification** - phones, audio, wearables, computers
|
|
- **Manufacturer lookup** via OUI database
|
|
- **Proximity radar** visualization
|
|
- **Device type breakdown** chart
|
|
|
|
### 🔔 Browser Notifications
|
|
- **Desktop notifications** for critical events (even when tab is in background)
|
|
- **Alerts for**: Drone detection, Rogue APs, Handshake capture, Hidden SSID reveals
|
|
- **Permission requested** on first interaction
|
|
|
|
### ❓ Help System
|
|
- **Built-in help page** accessible via ? button in header
|
|
- **Icon legend** for all stats bar icons
|
|
- **Mode-by-mode guides** with tips and instructions
|
|
- **Keyboard shortcut**: Press Escape to close
|
|
|
|
### 🎨 User Interface
|
|
- **Mode-specific header stats** - real-time badges showing key metrics per mode
|
|
- **UTC clock** - always visible in header for time-critical operations
|
|
- **Active mode indicator** - shows current mode with pulse animation
|
|
- **Collapsible sections** - click any header to collapse/expand
|
|
- **Panel styling** - gradient backgrounds with indicator dots
|
|
- **Tabbed mode selector** with icons (grouped by SDR/RF and Wireless)
|
|
- **Consistent design** - unified styling across main dashboard and popouts
|
|
- **Dark/Light theme toggle** - click moon/sun icon in header, preference saved
|
|
- **Keyboard shortcuts** - F1 or ? to open help
|
|
|
|
### ⌨️ Keyboard Shortcuts
|
|
| Key | Action |
|
|
|-----|--------|
|
|
| F1 | Open help |
|
|
| ? | Open help (when not typing) |
|
|
| Escape | Close help/modals |
|
|
|
|
### General
|
|
- **Web-based interface** - no desktop app needed
|
|
- **Live message streaming** via Server-Sent Events (SSE)
|
|
- **Audio alerts** with mute toggle
|
|
- **Message export** to CSV/JSON
|
|
- **Signal activity meter** and waterfall display
|
|
- **Message logging** to file with timestamps
|
|
- **Multi-SDR hardware support** - RTL-SDR, LimeSDR, HackRF
|
|
- **Automatic device detection** across all supported hardware
|
|
- **Hardware-specific validation** - frequency/gain ranges per device type
|
|
- **Configurable gain and PPM correction**
|
|
- **Device intelligence** dashboard with tracking
|
|
- **GPS dongle support** - USB GPS receivers for precise observer location
|
|
- **Disclaimer acceptance** on first use
|
|
- **Auto-stop** when switching between modes
|
|
|
|
---
|
|
|
|
## Requirements
|
|
|
|
### Hardware
|
|
- **SDR Device** (one of the following):
|
|
- RTL-SDR compatible dongle (RTL2832U based) - most common, budget-friendly
|
|
- LimeSDR / LimeSDR Mini - wider frequency range (100 kHz - 3.8 GHz)
|
|
- HackRF One - ultra-wide frequency range (1 MHz - 6 GHz)
|
|
- WiFi adapter capable of monitor mode (for WiFi features)
|
|
- Bluetooth adapter (for Bluetooth features)
|
|
|
|
### Software
|
|
- Python 3.9+ recommended (3.7+ may work but is not fully tested)
|
|
- Flask, skyfield, pyserial (installed via `requirements.txt`)
|
|
- rtl-sdr tools (`rtl_fm`)
|
|
- multimon-ng (for pager decoding)
|
|
- rtl_433 (for 433MHz sensor decoding)
|
|
- dump1090 or rtl_adsb (for ADS-B aircraft tracking)
|
|
- aircrack-ng (for WiFi reconnaissance)
|
|
- BlueZ tools - hcitool, bluetoothctl (for Bluetooth)
|
|
|
|
## Installation
|
|
|
|
### Install external tools
|
|
|
|
Install the tools for the features you need:
|
|
|
|
#### Core SDR Tools
|
|
|
|
| Tool | macOS | Ubuntu/Debian | Purpose |
|
|
|------|-------|---------------|---------|
|
|
| rtl-sdr | `brew install librtlsdr` | `sudo apt install rtl-sdr` | RTL-SDR support |
|
|
| multimon-ng | `brew install multimon-ng` | `sudo apt install multimon-ng` | Pager decoding |
|
|
| rtl_433 | `brew install rtl_433` | `sudo apt install rtl-433` | 433MHz sensors |
|
|
| dump1090 | `brew install dump1090-mutability` | `sudo apt install dump1090-mutability` | ADS-B aircraft |
|
|
| aircrack-ng | `brew install aircrack-ng` | `sudo apt install aircrack-ng` | WiFi reconnaissance |
|
|
| bluez | Built-in (limited) | `sudo apt install bluez bluetooth` | Bluetooth scanning |
|
|
|
|
#### Additional SDR Hardware (Optional)
|
|
|
|
For LimeSDR or HackRF support, install SoapySDR and the appropriate driver:
|
|
|
|
| Tool | macOS | Ubuntu/Debian | Purpose |
|
|
|------|-------|---------------|---------|
|
|
| SoapySDR | `brew install soapysdr` | `sudo apt install soapysdr-tools` | Universal SDR abstraction |
|
|
| LimeSDR | `brew install limesuite soapylms7` | `sudo apt install limesuite soapysdr-module-lms7` | LimeSDR support |
|
|
| HackRF | `brew install hackrf soapyhackrf` | `sudo apt install hackrf soapysdr-module-hackrf` | HackRF support |
|
|
| readsb | Build from source | Build from source | ADS-B with SoapySDR |
|
|
|
|
> **Note:** RTL-SDR works out of the box. LimeSDR and HackRF require SoapySDR plus the hardware-specific driver.
|
|
|
|
### Install and run
|
|
|
|
**Option 1: Automated setup (recommended)**
|
|
```bash
|
|
git clone https://github.com/smittix/intercept.git
|
|
cd intercept
|
|
./setup.sh # Installs Python deps and checks for external tools
|
|
sudo python3 intercept.py
|
|
```
|
|
|
|
**Option 2: Manual setup**
|
|
```bash
|
|
git clone https://github.com/smittix/intercept.git
|
|
cd intercept
|
|
pip install -r requirements.txt
|
|
sudo python3 intercept.py
|
|
```
|
|
|
|
**Option 3: Using a virtual environment**
|
|
```bash
|
|
git clone https://github.com/smittix/intercept.git
|
|
cd intercept
|
|
python3 -m venv venv
|
|
source venv/bin/activate # On Linux/macOS
|
|
pip install -r requirements.txt
|
|
sudo venv/bin/python intercept.py
|
|
```
|
|
|
|
Open `http://localhost:5050` in your browser.
|
|
|
|
> **Note:** Running as root/sudo is recommended for full functionality (monitor mode, raw sockets, etc.)
|
|
|
|
### Check dependencies
|
|
|
|
Run the built-in dependency checker to see what's installed and what's missing:
|
|
|
|
```bash
|
|
python3 intercept.py --check-deps
|
|
```
|
|
|
|
This will show the status of all required tools and provide installation instructions for your platform.
|
|
|
|
### Command-line options
|
|
|
|
```
|
|
python3 intercept.py --help
|
|
|
|
-p, --port PORT Port to run server on (default: 5050)
|
|
-H, --host HOST Host to bind to (default: 0.0.0.0)
|
|
-d, --debug Enable debug mode
|
|
--check-deps Check dependencies and exit
|
|
```
|
|
|
|
---
|
|
|
|
## Usage
|
|
|
|
### Pager Mode
|
|
1. **Select Hardware** - Choose your SDR type (RTL-SDR, LimeSDR, or HackRF)
|
|
2. **Select Device** - Choose your SDR device from the dropdown
|
|
3. **Set Frequency** - Enter a frequency in MHz or use a preset
|
|
4. **Choose Protocols** - Select which protocols to decode (POCSAG/FLEX)
|
|
5. **Adjust Settings** - Set gain, squelch, and PPM correction as needed
|
|
6. **Start Decoding** - Click the green "Start Decoding" button
|
|
|
|
### WiFi Mode
|
|
1. **Select Interface** - Choose a WiFi adapter capable of monitor mode
|
|
2. **Enable Monitor Mode** - Click "Enable Monitor" (uncheck "Kill processes" to preserve other connections)
|
|
3. **Start Scanning** - Click "Start Scanning" to begin
|
|
4. **View Networks** - Networks appear in the output panel with signal strength
|
|
5. **Track Devices** - Click 📈 on any network to track its signal over time
|
|
6. **Capture Handshakes** - Click "Capture" on a network to start handshake capture
|
|
|
|
### Bluetooth Mode
|
|
1. **Select Interface** - Choose your Bluetooth adapter
|
|
2. **Choose Mode** - Select scan mode (hcitool, bluetoothctl)
|
|
3. **Start Scanning** - Click "Start Scanning"
|
|
4. **View Devices** - Devices appear with name, address, and classification
|
|
|
|
### Aircraft Mode
|
|
1. **Select Hardware** - Choose your SDR type (RTL-SDR uses dump1090, others use readsb)
|
|
2. **Check Tools** - Ensure dump1090 or readsb is installed
|
|
3. **Set Location** - Choose location source:
|
|
- **Manual Entry** - Type coordinates directly
|
|
- **Browser GPS** - Use browser's built-in geolocation (requires HTTPS)
|
|
- **USB GPS Dongle** - Connect a USB GPS receiver for continuous updates
|
|
4. **Start Tracking** - Click "Start Tracking" to begin ADS-B reception
|
|
5. **View Map** - Aircraft appear on the interactive Leaflet map
|
|
6. **Click Aircraft** - Click markers for detailed information
|
|
7. **Display Options** - Toggle callsigns, altitude, trails, range rings, clustering
|
|
8. **Filter Aircraft** - Use dropdown to show all, military, civil, or emergency only
|
|
9. **Full Dashboard** - Click "Full Screen Dashboard" for dedicated radar view
|
|
|
|
### Satellite Mode
|
|
1. **Set Location** - Choose location source:
|
|
- **Manual Entry** - Type coordinates directly
|
|
- **Browser GPS** - Use browser's built-in geolocation
|
|
- **USB GPS Dongle** - Connect a USB GPS receiver for continuous updates
|
|
2. **Add Satellites** - Click "Add Satellite" to enter TLE data or fetch from Celestrak
|
|
3. **Calculate Passes** - Click "Calculate Passes" to predict upcoming passes
|
|
4. **View Sky Plot** - Polar plot shows satellite positions in real-time
|
|
5. **Ground Track** - Map displays satellite orbit path and current position
|
|
6. **Full Dashboard** - Click "Full Screen Dashboard" for dedicated satellite view
|
|
7. **Iridium Mode** - Switch tabs to monitor for Iridium burst transmissions
|
|
|
|
### Frequency Presets
|
|
|
|
- Click a preset button to quickly set a frequency
|
|
- Add custom presets using the input field and "Add" button
|
|
- Right-click a preset to remove it
|
|
- Click "Reset to Defaults" to restore default frequencies
|
|
|
|
---
|
|
|
|
## Troubleshooting
|
|
|
|
### Python/pip installation issues
|
|
|
|
**"ModuleNotFoundError: No module named 'flask'":**
|
|
```bash
|
|
# You need to install Python dependencies first
|
|
pip install -r requirements.txt
|
|
|
|
# Or with python3 explicitly
|
|
python3 -m pip install -r requirements.txt
|
|
```
|
|
|
|
**"TypeError: 'type' object is not subscriptable":**
|
|
This error occurs on Python 3.7 or 3.8. Please upgrade to Python 3.9 or later:
|
|
```bash
|
|
# Check your Python version
|
|
python3 --version
|
|
|
|
# Ubuntu/Debian - install newer Python
|
|
sudo apt update
|
|
sudo apt install python3.10
|
|
|
|
# Or use pyenv to manage Python versions
|
|
```
|
|
|
|
**"externally-managed-environment" error (Ubuntu 23.04+, Debian 12+):**
|
|
```bash
|
|
# Option 1: Use a virtual environment (recommended)
|
|
python3 -m venv venv
|
|
source venv/bin/activate
|
|
pip install -r requirements.txt
|
|
|
|
# Option 2: Use pipx for isolated install
|
|
pipx install flask skyfield
|
|
|
|
# Option 3: Override the restriction (not recommended)
|
|
pip install -r requirements.txt --break-system-packages
|
|
```
|
|
|
|
**"pip: command not found":**
|
|
```bash
|
|
# Ubuntu/Debian
|
|
sudo apt install python3-pip
|
|
|
|
# macOS
|
|
python3 -m ensurepip --upgrade
|
|
```
|
|
|
|
**Permission denied errors:**
|
|
```bash
|
|
# Install to user directory instead
|
|
pip install --user -r requirements.txt
|
|
```
|
|
|
|
### No SDR devices found
|
|
- Ensure your SDR device is plugged in
|
|
- Check `rtl_test` (RTL-SDR) or `SoapySDRUtil --find` (LimeSDR/HackRF)
|
|
- On Linux, you may need udev rules (see setup.sh output)
|
|
- On Linux, blacklist the DVB-T driver:
|
|
```bash
|
|
echo "blacklist dvb_usb_rtl28xxu" | sudo tee /etc/modprobe.d/blacklist-rtl.conf
|
|
sudo modprobe -r dvb_usb_rtl28xxu
|
|
```
|
|
|
|
### No messages appearing
|
|
- Verify the frequency is correct for your area
|
|
- Adjust the gain (try 30-40 dB)
|
|
- Check that pager services are active in your area
|
|
- Ensure antenna is connected
|
|
|
|
### WiFi monitor mode fails
|
|
- Ensure you're running as root/sudo
|
|
- Check your adapter supports monitor mode: `iw list | grep monitor`
|
|
- Try: `airmon-ng check kill` to stop interfering processes
|
|
|
|
### Device busy error
|
|
- Click "Kill All Processes" to stop any stale processes
|
|
- Unplug and replug the SDR device
|
|
- Check if another application is using the device: `lsof | grep rtl`
|
|
|
|
### LimeSDR/HackRF not detected
|
|
- Ensure SoapySDR is installed: `SoapySDRUtil --info`
|
|
- Check the driver module is loaded: `SoapySDRUtil --find`
|
|
- Verify permissions (may need udev rules or run as root)
|
|
|
|
### GPS dongle not detected
|
|
- Ensure pyserial is installed: `pip install pyserial`
|
|
- Check the device is connected: `ls /dev/ttyUSB* /dev/ttyACM*` (Linux) or `ls /dev/tty.usb*` (macOS)
|
|
- Verify permissions: you may need to add your user to the `dialout` group (Linux):
|
|
```bash
|
|
sudo usermod -a -G dialout $USER
|
|
```
|
|
- Most GPS dongles use 9600 baud rate (default in INTERCEPT)
|
|
- The GPS needs a clear view of the sky to get a fix
|
|
|
|
---
|
|
|
|
## Configuration
|
|
|
|
INTERCEPT can be configured via environment variables:
|
|
|
|
| Variable | Default | Description |
|
|
|----------|---------|-------------|
|
|
| `INTERCEPT_HOST` | `0.0.0.0` | Server bind address |
|
|
| `INTERCEPT_PORT` | `5050` | Server port |
|
|
| `INTERCEPT_DEBUG` | `false` | Enable debug mode |
|
|
| `INTERCEPT_LOG_LEVEL` | `WARNING` | Log level (DEBUG, INFO, WARNING, ERROR) |
|
|
| `INTERCEPT_DEFAULT_GAIN` | `40` | Default RTL-SDR gain |
|
|
|
|
Example: `INTERCEPT_PORT=8080 sudo python3 intercept.py`
|
|
|
|
---
|
|
|
|
## License
|
|
|
|
MIT License - see [LICENSE](LICENSE) for details.
|
|
|
|
## Author
|
|
|
|
Created by **smittix** - [GitHub](https://github.com/smittix)
|
|
|
|
## Supported SDR Hardware
|
|
|
|
| Hardware | Frequency Range | Gain Range | TX | Notes |
|
|
|----------|-----------------|------------|-----|-------|
|
|
| **RTL-SDR** | 24 - 1766 MHz | 0 - 50 dB | No | Most common, budget-friendly (~$25) |
|
|
| **LimeSDR** | 0.1 - 3800 MHz | 0 - 73 dB | Yes | Wide range, requires SoapySDR |
|
|
| **HackRF** | 1 - 6000 MHz | 0 - 62 dB | Yes | Ultra-wide range, requires SoapySDR |
|
|
|
|
The application automatically detects connected devices and shows hardware-specific capabilities (frequency limits, gain ranges) in the UI.
|
|
|
|
---
|
|
|
|
## Acknowledgments
|
|
|
|
- [rtl-sdr](https://osmocom.org/projects/rtl-sdr/wiki) - RTL-SDR drivers
|
|
- [multimon-ng](https://github.com/EliasOenal/multimon-ng) - Multi-protocol pager decoder
|
|
- [rtl_433](https://github.com/merbanan/rtl_433) - 433MHz sensor decoder
|
|
- [dump1090](https://github.com/flightaware/dump1090) - ADS-B decoder for aircraft tracking
|
|
- [SoapySDR](https://github.com/pothosware/SoapySDR) - Universal SDR abstraction layer
|
|
- [LimeSuite](https://github.com/myriadrf/LimeSuite) - LimeSDR driver and tools
|
|
- [aircrack-ng](https://www.aircrack-ng.org/) - WiFi security auditing tools
|
|
- [BlueZ](http://www.bluez.org/) - Official Linux Bluetooth protocol stack
|
|
- [Leaflet.js](https://leafletjs.com/) - Interactive maps for aircraft tracking
|
|
- [OpenStreetMap](https://www.openstreetmap.org/) - Map tile data
|
|
- [Celestrak](https://celestrak.org/) - Satellite TLE data
|
|
- Inspired by the SpaceX mission control aesthetic
|
|
|
|
---
|
|
|
|
## ⚠️ Disclaimer
|
|
|
|
**This software is for educational purposes only and intended for use by cybersecurity professionals in controlled environments.**
|
|
|
|
By using INTERCEPT, you acknowledge that:
|
|
- You will only use this tool with proper authorization
|
|
- Intercepting communications without consent may be illegal in your jurisdiction
|
|
- WiFi deauthentication and Bluetooth attacks should only be performed on networks/devices you own or have explicit permission to test
|
|
- You are solely responsible for ensuring compliance with all applicable laws and regulations
|
|
- The developers assume no liability for misuse of this software
|
|
|
|
A disclaimer must be accepted when first launching the application.
|
|
|
|
|
|
|
|
|