https://github.com/gobiassomecoffeeco/rizzyscope
Rizzyscope: Wireless Signal Strength Monitor
https://github.com/gobiassomecoffeeco/rizzyscope
enumeration golang hacking kismet networking pentesting rssi rssi-detectors scanning security wifi wifi-network wifi-security wireless
Last synced: 22 days ago
JSON representation
Rizzyscope: Wireless Signal Strength Monitor
- Host: GitHub
- URL: https://github.com/gobiassomecoffeeco/rizzyscope
- Owner: GobiasSomeCoffeeCo
- License: gpl-3.0
- Created: 2024-08-17T23:58:14.000Z (over 1 year ago)
- Default Branch: main
- Last Pushed: 2024-10-15T23:13:11.000Z (about 1 year ago)
- Last Synced: 2025-01-14T10:55:49.078Z (10 months ago)
- Topics: enumeration, golang, hacking, kismet, networking, pentesting, rssi, rssi-detectors, scanning, security, wifi, wifi-network, wifi-security, wireless
- Language: Go
- Homepage:
- Size: 283 KB
- Stars: 9
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# Rizzyscope

## Overview
Rizzyscope is a command-line tool designed for wireless network monitoring and analysis. Built as an interface to the Kismet wireless network detector, it provides real-time monitoring capabilities for network security professionals, researchers, and system administrators.
The tool enables users to monitor the Received Signal Strength Indicator (RSSI) of specific MAC addresses directly from the terminal, facilitating network troubleshooting, security auditing, and wireless device tracking. Rizzyscope streamlines the process of detecting unauthorized devices, monitoring network activity, and conducting wireless security assessments.
## Key Features
- **Automated Kismet Integration**: Automatically launches and configures Kismet, eliminating manual setup procedures
- **Target Device Monitoring**: Track specific devices by MAC address using the Kismet API
- **Channel Lock Functionality**: Automatically locks onto the target device's operating channel for focused monitoring
- **Real-Time RSSI Visualization**: Displays signal strength data through an intuitive terminal-based progress bar
- **Flexible Configuration**: Supports both TOML configuration files and command-line parameter overrides
- **Multi-Interface Support**: Compatible with multiple wireless network interfaces simultaneously
## System Requirements
### Dependencies
- **Kismet**: Wireless network detector and monitoring framework
- Must be installed and accessible in system PATH
- Visit [Kismet Official Website](https://kismetwireless.net/) for installation instructions
- **Go**: Go programming language runtime (for building from source)
- **Root Privileges**: Administrative access required for network interface manipulation
### Hardware Requirements
- Compatible wireless network interface capable of monitor mode
- Sufficient system resources for real-time signal processing
## Installation
### Binary Installation
Download the latest pre-compiled binary from the [GitHub Releases](https://github.com/GobiasSomeCoffeeCo/rizzyscope/releases) page. Select the appropriate version for your operating system and architecture.
### Building from Source
1. **Clone the repository**:
```bash
git clone https://github.com/GobiasSomeCoffeeCo/rizzyscope.git
cd rizzyscope
```
2. **Build the executable**:
```bash
go build -o rizzyscope
```
## Configuration
Rizzyscope supports configuration through TOML files with command-line override capabilities.
### Configuration File Structure
Create a `config.toml` file in the executable directory:
```toml
[required]
target_mac = ["12:34:56:AA:CC:EE", "22:34:56:bb:cc:ee", "554456BBCCEE", "ab3423febc3d"]
interface = ["wlp0s20f0u2u3", "wlp0s20f0u2u4"]
[optional]
target_ssid = ["NetworkName1", "NetworkName2", "NetworkName3"]
kismet_endpoint = "127.0.0.1:2501"
[credentials]
user = "kismet_user"
password = "kismet_password"
```
### Configuration Parameters
- **target_mac**: Array of MAC addresses to monitor (required)
- **interface**: Network interfaces for monitoring (required)
- **target_ssid**: Filter by specific network names (optional)
- **kismet_endpoint**: Kismet server endpoint (default: 127.0.0.1:2501)
- **credentials**: Kismet authentication credentials
## Usage
### Basic Operation
**Using configuration file:**
```bash
sudo ./rizzyscope
```
**Command-line parameter override:**
```bash
sudo ./rizzyscope -m 11:34:56:23:23:EE,22:34:56:BB:BB:EE -i wlp0s20f0u2u3
```
**Custom configuration file:**
```bash
sudo ./rizzyscope -c /path/to/custom/config.toml
```
**Using existing Kismet instance:**
```bash
sudo ./rizzyscope --skip-kismet
# or
sudo ./rizzyscope -k
```
### Command-Line Options
- `-m, --mac`: Specify target MAC addresses (comma-separated)
- `-i, --interface`: Specify network interfaces (comma-separated)
- `-c, --config`: Path to configuration file
- `-k, --skip-kismet`: Use existing Kismet instance
- `--help`: Display usage information
## Operation Workflow
1. **Kismet Initialization**: Automatically launches Kismet on specified network interfaces
2. **Target Discovery**: Queries Kismet API to locate specified MAC addresses
3. **Channel Lock**: Locks network interface to target device's operating channel
4. **Real-Time Monitoring**: Continuously displays RSSI values through terminal interface
## Output Format
The application provides real-time RSSI monitoring through a terminal-based progress bar interface, displaying signal strength variations for tracked devices.
## Use Cases
- **Network Security Auditing**: Identify unauthorized devices and monitor network access
- **Wireless Troubleshooting**: Analyze signal strength and connectivity issues
- **Research and Development**: Support wireless network research and testing
- **Infrastructure Monitoring**: Track device presence and signal characteristics
## Support and Contributions
For technical support, bug reports, or feature requests, please submit an issue through the [GitHub Issues](https://github.com/GobiasSomeCoffeeCo/rizzyscope/issues) page.
## License
Please refer to the LICENSE file in the repository for licensing information.
## Disclaimer
This tool is intended for legitimate network monitoring and security research purposes. Users are responsible for ensuring compliance with applicable laws and regulations regarding wireless network monitoring in their jurisdiction.