The first GitHub tool designed to detect hidden tracking, telemetry, and spyware packets via MITM attack
Telecap is an advanced network monitoring and analysis tool specifically designed to detect and capture hidden tracking, telemetry, and spyware packets across various platforms and manufacturers. Perfect for security researchers, pentesters, and privacy-conscious users.
- π΅οΈββοΈ Advanced Packet Capture - Real-time network traffic monitoring
- π― Targeted Filtering - Pre-configured filters for major vendors:
- Intel AMT & Telemetry
- AMD Update Services
- Samsung Telemetry
- NVIDIA Drivers & Telemetry
- Apple iCloud & Tracking
- Cisco Enterprise Services
- Broadcom Firmware Updates
- π MITM Capabilities - ARP spoofing for comprehensive analysis
- π Multiple View Modes - Live view, file capture, or both
- π Custom Filters - Create your own detection rules
- π± WiFi Monitoring - Detect all devices on your network
cd /tmp && git clone https://github.com/undercodeutilities/telecap.git && cd telecap && bash installwget -c https://github.com/undercodeutilities/telecap/archive/main.zip -O telecap.zip \
&& unzip telecap.zip \
&& cd telecap \
&& bash installgit clone https://github.com/undercodeutilities/telecap.git
cd telecap
bash install- Compatible WiFi adapter with monitor mode support
- Root privileges
- Required tools:
tshark,arp-scan,dsniff,xterm(automatically installed by install script)
# After installation, run the tool
sudo u_capturealias tcap='sudo u_capture'- Run the tool:
sudo u_capture - Select interface: Choose your monitoring interface
- Configure filters: Pick from pre-defined vendor filters or create custom
- Scan network: Discover active hosts
- Start monitoring: Begin packet capture and analysis
- Intel Telemetry: AMT ports + telemetry domains
- Apple Tracking: iCloud services + analytics endpoints
- Samsung Spyware: Update servers + telemetry domains
- Custom Ports: Monitor specific ports only
- π Live View: Real-time packet display
- πΎ Save to File: Capture to pcap for later analysis
- π Both: Live view + simultaneous file saving
telecap/
βββ install # Installation script
βββ u_capture # Main executable script
βββ u_systemcheck # System compatibility checker
βββ u_capture_future_instructions.txt # Detailed usage guide
βββ README.md # This documentation
βββ LICENSE # MIT License
βββ captures/ # Default capture directory (created automatically)
βββ network_capture_*.pcap
graph TD
ROOT["Telecap Core"] --> INTERFACE["Interface Detection"]
ROOT --> FILTERS["Filter Engine"]
ROOT --> CAPTURE["Packet Capture"]
INTERFACE --> MONITOR["Monitor Mode"]
INTERFACE --> STANDARD["Standard Mode"]
FILTERS --> VENDOR["Vendor Filters"]
FILTERS --> CUSTOM["Custom Filters"]
FILTERS --> PORTS["Port-based"]
CAPTURE --> LIVE["Live View"]
CAPTURE --> SAVE["File Save"]
CAPTURE --> MITM["MITM Analysis"]
VENDOR --> INTEL["Intel"]
VENDOR --> AMD["AMD"]
VENDOR --> SAMSUNG["Samsung"]
VENDOR --> NVIDIA["NVIDIA"]
VENDOR --> APPLE["Apple"]
VENDOR --> CISCO["Cisco"]
VENDOR --> BROADCOM["Broadcom"]
- Capture Location:
/home/$USER/Desktop/u_captures/ - File Format:
network_capture_YYYYMMDD_HHMMSS.pcap - Default Filter: All traffic (configurable)
Edit the following variables in u_capture:
DESKTOP_PATH="/home/$USER/Desktop" # Change capture location
CAPTURE_FILE="custom_name.pcap" # Change file naming# Check system compatibility
sudo u_systemcheck
# Verify WiFi adapter
iwconfig
# Check monitor mode
sudo airmon-ng
# Kill interfering processes
sudo airmon-ng check killThe install script automatically installs dependencies, but you can manually install them:
# Ubuntu/Debian
sudo apt update && sudo apt install tshark arp-scan dsniff xterm
# CentOS/RHEL
sudo yum install wireshark arp-scan dsniff xterm- Educational Purpose Only - For authorized testing only
- Permission Required - Only monitor networks you own or have explicit permission to test
- Responsible Disclosure - Handle captured data ethically
- Compliance - Follow local laws and regulations
=== LIVE PACKET CAPTURE ===
Interface: wlan0
Filter: Intel (AMT ports + telemetry & intel domains)
Press Ctrl+C to stop
==========================
=== URL & DOMAIN MONITOR ===
Filter: Samsung telemetry & update endpoints
Interface: wlan0
Press Enter & Ctrl+Z to stop
============================
This project is licensed under the MIT License.
If you find this tool useful, consider supporting our work:
Join Our Community: Undercode.help/Community
For detailed instructions, see u_capture_future_instructions.txt after installation.

