THE ULTIMATE CELLULAR HUNT
From GSM 850 to 5G FR2 mmWave. Extract IMSI in <50ms. Crack A5/1 with 90%+ success. Classify 35+ signal types with ML. Triangulate with WebRTC mesh. One tool. Every generation. Complete visibility.
Complete cellular spectrum coverage from legacy 2G to cutting-edge 5G mmWave
IMSI, TAC, EARFCN extraction. A5/1 rainbow attacks.
ProductionTLLI extraction. GEA cipher analysis.
ProductionIMSI extraction. Limited attack surface.
BetaGUTI, TAC extraction. MIB/SIB/NAS decode.
Production5G-GUTI extraction. Sub-6GHz coverage.
ProductionmmWave 24-52 GHz. Requires wideband SDR.
BetaMSISDN extraction. Location queries.
ProductionAPN extraction. Subscriber tracking.
Production802.11, Bluetooth, ZigBee analysis.
ProductionLPWAN signal detection and decode.
BetaFrom RF capture to identity extraction
Real-time GSM cipher key recovery using precomputed rainbow tables. The A5/1 stream cipher has known cryptographic weaknesses that allow practical key recovery in under 2 seconds with full keyspace coverage.
From $30 RTL-SDR to enterprise-grade USRP
18,500 lines of battle-tested Rust
IMSI, TMSI, GUTI, 5G-GUTI, MSISDN, IMEI. Complete subscriber identity capture across all generations.
Synchronized capture across multiple SDR devices. GPS-disciplined timing for coordinated operations.
NAT-traversing peer-to-peer network for distributed operations. DTLS encryption. SCTP data channels.
Multi-node geolocation with configurable accuracy. RTK GPS support for sub-meter positioning.
Terminal UI with live signal visualization. REST API and WebSocket for integration.
Persistent storage with time-series optimization. Fast queries across millions of captures.
Authorized security research and defense applications
Protocol vulnerability analysis in controlled lab environments. Academic research on cellular security. CVE discovery and responsible disclosure.
Authorized red team engagements. Cellular infrastructure assessment. IMSI catcher detection and countermeasures testing.
Rogue base station detection. Corporate facility monitoring. Counter-surveillance and TSCM operations.
Telecommunications curriculum. Security awareness training. Hands-on protocol analysis labs.
From 2G to 5G mmWave. One platform. Total awareness.