Daytripper is a laser tripwire security device designed to provide physical privacy protection for computer workstations. The system consists of two components: a Transmitter (TX) and a Receiver (RX) that communicate wirelessly to detect motion within a 120cm range. When motion is detected, the device can automatically hide all open windows, lock the computer, or execute custom scripts based on user configuration. The system operates with a scan rate of 6Hz when running on battery power and increases to 30Hz when connected to power. The device features a rechargeable battery with 50-hour life, charged via USB-C connection. Communication between the TX and RX components has a range of up to 100 meters in open-air conditions. The tool includes configuration software that allows users to customize detection parameters and response actions. Daytripper works natively with Windows systems out-of-the-box and maintains compatibility with other major operating systems. The device provides a physical security layer for protecting sensitive information displayed on screens when users step away from their workstations.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
PLCinject is a tool for injecting and patching blocks on PLCs with a call instruction.
A hardware security validation toolkit for x86 platforms that provides bootable tools for checking platform configuration registers and managing SecureBoot keys.
A comprehensive collection of wordlists for bruteforcing and password cracking, covering various hashing algorithms and sizes.
Python tool for monitoring user-select APIs in Android apps using Frida.
A platform for creating and managing fake phishing campaigns to raise awareness and train users to identify suspicious emails.
Phish Report is inaccessible without JavaScript and cookies enabled.
A Graphical Realism Framework for Industrial Control Simulation organized as 5 VirtualBox VMs for realistic ICS network simulation.
An Active Defense framework for detecting and responding to phishing attacks in Office 365 Message Trace logs.
A command line steganography tool that uses LSB technique to hide files within images without visible alteration.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.