WireTapper: One-Click Open-Source Tool to Reveal All Nearby Wireless Devices
WireTapper is an open-source OSINT/SIGINT platform that passively scans and visualizes every nearby wireless device—from Wi-Fi and Bluetooth to CCTV and vehicle RF—using a privacy-preserving k-anonymous query, integrates multiple external APIs, and offers a quick two-step deployment with a sleek web UI.
Overview
WireTapper is an open‑source platform that combines wireless OSINT and SIGINT to passively monitor nearby radio devices without active intrusion. It uses a k‑anonymous query mechanism to detect Wi‑Fi credential leaks while preserving privacy and aggregates data from multiple external intelligence services.
Supported wireless signals
Wi‑Fi : access points, clients, and Wi‑Fi password leak detection
Bluetooth / BLE : headphones, wearables, phones, etc.
Wireless surveillance : CCTV cameras, IP cameras, dashcams
Vehicle wireless : car infotainment, telemetry, key‑less entry RF
Smart devices : smart TVs, IoT appliances, wearables
Mobile networks : base‑station signals, carrier beacons
Core API integrations (API keys required)
Wigle.net : wireless network mapping and hotspot discovery
wpa-sec : WPA‑PSK password leak audit database
OpenCellID : open‑source cell‑tower location database
Shodan : internet‑connected device search engine (requires a paid account)
Quick deployment (two steps)
1. Clone the repository and install dependencies
# Clone the repo
git clone https://github.com/h9zdev/WireTapper.git
cd WireTapper
# Install Python requirements
pip install -r WireTapper.txt2. Configure API keys and start the service (environment‑variable method recommended)
Create or edit a .env file and fill in the required API keys.
Run the application:
python app-env.pyAfter starting, open http://localhost:8080/map-w in a browser to view the monitoring dashboard.
User interface
The web panel uses a dark, technology‑styled theme with clear functional zones:
Top bar : device status and online indicators
Left navigation : sections for Wi‑Fi, Bluetooth, surveillance, vehicle, settings, etc.
Center area : search box and device list showing MAC address, type, vendor, and last seen time
Bottom bar : data source information and alert messages
Project repository: https://github.com/h9zdev/WireTapper
Signed-in readers can open the original source through BestHub's protected redirect.
This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactand we will review it promptly.
Black & White Path
We are the beacon of the cyber world, a stepping stone on the road to security.
How this landed with the community
Was this worth your time?
0 Comments
Thoughtful readers leave field notes, pushback, and hard-won operational detail here.
