Skip to content

The first GitHub tool for identifying hidden spyware requests, telemetry data, and tracking packets in network traffic.

License

Notifications You must be signed in to change notification settings

UndercodeUtilities/telecap

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

7 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

Telecap - Advanced Telemetry & Tracking Detection Tool

Telecap


The first GitHub tool designed to detect hidden tracking, telemetry, and spyware packets via MITM attack

πŸš€ Overview

Telecap is an advanced network monitoring and analysis tool specifically designed to detect and capture hidden tracking, telemetry, and spyware packets across various platforms and manufacturers. Perfect for security researchers, pentesters, and privacy-conscious users.

✨ Features

  • πŸ•΅οΈβ€β™‚οΈ Advanced Packet Capture - Real-time network traffic monitoring
  • 🎯 Targeted Filtering - Pre-configured filters for major vendors:
    • Intel AMT & Telemetry
    • AMD Update Services
    • Samsung Telemetry
    • NVIDIA Drivers & Telemetry
    • Apple iCloud & Tracking
    • Cisco Enterprise Services
    • Broadcom Firmware Updates
  • 🌐 MITM Capabilities - ARP spoofing for comprehensive analysis
  • πŸ“Š Multiple View Modes - Live view, file capture, or both
  • πŸ” Custom Filters - Create your own detection rules
  • πŸ“± WiFi Monitoring - Detect all devices on your network

πŸ›  Installation

One-Command Install

cd /tmp && git clone https://github.com/undercodeutilities/telecap.git && cd telecap && bash install

Alternative Methods

Quick Install (Zip)

wget -c https://github.com/undercodeutilities/telecap/archive/main.zip -O telecap.zip \
  && unzip telecap.zip \
  && cd telecap \
  && bash install

Git Clone

git clone https://github.com/undercodeutilities/telecap.git
cd telecap
bash install

⚑ Quick Start

Prerequisites

  • Compatible WiFi adapter with monitor mode support
  • Root privileges
  • Required tools: tshark, arp-scan, dsniff, xterm (automatically installed by install script)

First Run

# After installation, run the tool
sudo u_capture

Quick Alias (Add to ~/.bashrc)

alias tcap='sudo u_capture'

🎯 Usage Guide

Basic Operation

  1. Run the tool: sudo u_capture
  2. Select interface: Choose your monitoring interface
  3. Configure filters: Pick from pre-defined vendor filters or create custom
  4. Scan network: Discover active hosts
  5. Start monitoring: Begin packet capture and analysis

Filter Examples

  • Intel Telemetry: AMT ports + telemetry domains
  • Apple Tracking: iCloud services + analytics endpoints
  • Samsung Spyware: Update servers + telemetry domains
  • Custom Ports: Monitor specific ports only

Capture Modes

  • πŸ“Š Live View: Real-time packet display
  • πŸ’Ύ Save to File: Capture to pcap for later analysis
  • πŸ”„ Both: Live view + simultaneous file saving

πŸ“ File Structure

telecap/
β”œβ”€β”€ install                    # Installation script
β”œβ”€β”€ u_capture                 # Main executable script
β”œβ”€β”€ u_systemcheck             # System compatibility checker
β”œβ”€β”€ u_capture_future_instructions.txt  # Detailed usage guide
β”œβ”€β”€ README.md                 # This documentation
β”œβ”€β”€ LICENSE                   # MIT License
└── captures/                 # Default capture directory (created automatically)
    └── network_capture_*.pcap

πŸ— System Architecture

graph TD
    ROOT["Telecap Core"] --> INTERFACE["Interface Detection"]
    ROOT --> FILTERS["Filter Engine"]
    ROOT --> CAPTURE["Packet Capture"]
    
    INTERFACE --> MONITOR["Monitor Mode"]
    INTERFACE --> STANDARD["Standard Mode"]
    
    FILTERS --> VENDOR["Vendor Filters"]
    FILTERS --> CUSTOM["Custom Filters"]
    FILTERS --> PORTS["Port-based"]
    
    CAPTURE --> LIVE["Live View"]
    CAPTURE --> SAVE["File Save"]
    CAPTURE --> MITM["MITM Analysis"]
    
    VENDOR --> INTEL["Intel"]
    VENDOR --> AMD["AMD"]
    VENDOR --> SAMSUNG["Samsung"]
    VENDOR --> NVIDIA["NVIDIA"]
    VENDOR --> APPLE["Apple"]
    VENDOR --> CISCO["Cisco"]
    VENDOR --> BROADCOM["Broadcom"]
Loading

πŸ”§ Configuration

Default Settings

  • Capture Location: /home/$USER/Desktop/u_captures/
  • File Format: network_capture_YYYYMMDD_HHMMSS.pcap
  • Default Filter: All traffic (configurable)

Customization

Edit the following variables in u_capture:

DESKTOP_PATH="/home/$USER/Desktop"  # Change capture location
CAPTURE_FILE="custom_name.pcap"     # Change file naming

πŸ› Troubleshooting

Common Issues

# Check system compatibility
sudo u_systemcheck

# Verify WiFi adapter
iwconfig

# Check monitor mode
sudo airmon-ng

# Kill interfering processes
sudo airmon-ng check kill

Dependencies Installation

The install script automatically installs dependencies, but you can manually install them:

# Ubuntu/Debian
sudo apt update && sudo apt install tshark arp-scan dsniff xterm

# CentOS/RHEL
sudo yum install wireshark arp-scan dsniff xterm

⚠️ Legal & Ethical Usage

  • Educational Purpose Only - For authorized testing only
  • Permission Required - Only monitor networks you own or have explicit permission to test
  • Responsible Disclosure - Handle captured data ethically
  • Compliance - Follow local laws and regulations

πŸ“Š Output Examples

Live Capture

=== LIVE PACKET CAPTURE ===
Interface: wlan0
Filter: Intel (AMT ports + telemetry & intel domains)
Press Ctrl+C to stop
==========================

URL Monitoring

=== URL & DOMAIN MONITOR ===
Filter: Samsung telemetry & update endpoints
Interface: wlan0
Press Enter & Ctrl+Z to stop
============================

πŸ“‘ Stay Tuned:

WhatsApp Telegram

πŸ“œ Licensing

This project is licensed under the MIT License.

MIT License

πŸ’ Donations

If you find this tool useful, consider supporting our work:

Buy Me a Coffee

🌐 Connect With Us

GitHub badge

πŸ“š Resources


⚠️ Disclaimer: This tool is for educational and authorized testing purposes only. Always ensure you have proper permission before monitoring any network. The developers are not responsible for misuse.

Join Our Community: Undercode.help/Community


For detailed instructions, see u_capture_future_instructions.txt after installation.

About

The first GitHub tool for identifying hidden spyware requests, telemetry data, and tracking packets in network traffic.

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages