I'm a hacker, researcher, and digital archaeologist documenting the evolution of cyber culture through wardriving, OSINT, and hacker cinema. My work focuses on mapping the invisible networks that connect us—from wireless access points scattered across cities to the underground communities that shaped the internet.
This site is my digital archive: a collection of 92 hacker films and documentaries, comprehensive wardriving guides, and research into the culture that built the shadow internet. Whether you're here to learn about Kali Linux, discover forgotten hacker documentaries, or explore the intersection of technology and rebellion—welcome.
Information wants to be free. Everything here is shared in that spirit.
GitHub: @Ringmast4r
Instagram: @ringmast4r
lnk.bio/ringmast4r
Most of first contact with the hacker community and what I've learned as a hacker historian didn't come from textbooks—it came from the screen. Most notable the Matrix Movies per my generation. I've watched every single documentary and movie on this list, absorbing the culture, code, and chaos that shaped the early hacker world. These films have been more than just entertainment—they've been a crash course in digital rebellion, underground networks, and the minds that built the internet's shadow world.
If you're curious about where hacker history meets cinematic storytelling, this list is for you. It's been a treasure trove of knowledge and inspiration for me, and now I'm passing it on to you.
This is my archive, my reference library, my cinematic rabbit hole. Enjoy the ride—and remember, information wants to be free.
Here's my list to you as a gift. IMDB List
---work in progress - - - more videos are being added to the list --- thank you for your patience --
Rufus Settings:
Run the following commands in Terminal:
sudo apt update
sudo apt upgrade -y
sudo bash -c 'echo "deb http://http.kali.org/kali kali-rolling main contrib non-free non-free-firmware" > /etc/apt/sources.list'
sudo timedatectl set-ntp true
sudo systemctl restart systemd-timesyncd
timedatectl # Use this to verify time is correct
sudo apt update && sudo apt full-upgrade -y
sudo apt clean
sudo apt autoremove -y
sudo reboot
sudo apt install -y gpsd gpsd-clients python3-gps
Bonus (for Kismet compatibility):
sudo apt install -y kismet gpsbabel gnuplot
Edit the GPSD config file:
sudo nano /etc/default/gpsd
Find the line starting with DEVICES= and change it to:
DEVICES="/dev/ttyACM0"
Save and exit (Ctrl + X, then Y, then Enter).
sudo systemctl restart gpsd
cgps
xgps
Wait a few seconds to see GPS coordinates appear.
sudo systemctl start gpsd # Start GPSD
sudo systemctl status gpsd # Check if it's running
sudo systemctl enable gpsd # Enable GPSD at boot
sudo systemctl restart gpsd # Restart GPSD
sudo nano /etc/kismet/kismet.conf
Scroll to the GPS CONFIGURATION section. Find this line:
# gps=gpsd:host=localhost,port=2947
Uncomment it (remove the #), so it reads:
gps=gpsd:host=localhost,port=2947
Save and exit the file.
sudo systemctl restart kismet
sudo kismet
Open the Kismet web interface and check for live GPS coordinates.
sudo apt install build-essential libelf-dev linux-headers-$(uname -r) dkms -y
cd /usr/src/
sudo git clone https://github.com/aircrack-ng/rtl8812au.git
sudo dkms add ./rtl8812au
sudo dkms build 8812au/5.6.4.2
sudo dkms install 8812au/5.6.4.2
sudo reboot
After rebooting, run:
iwconfig # Check for wlan interface
lsusb # Ensure USB adapter is detected
Run this on a fresh Kali install to handle driver setup automatically:
sudo apt install -y dkms build-essential libelf-dev linux-headers-$(uname -r) && \
git clone https://github.com/aircrack-ng/rtl8812au.git && \
cd rtl8812au && make && sudo make install && sudo depmod -a && \
echo "88XXau" | sudo tee -a /etc/modules && \
echo 'ACTION=="add", SUBSYSTEM=="usb", ATTR{idVendor}=="0bda", ATTR{idProduct}=="8813", RUN+="/sbin/modprobe 88XXau"' | \
sudo tee /etc/udev/rules.d/8814au.rules && \
sudo udevadm control --reload-rules && sudo udevadm trigger
If you're running Kali Linux and using a Realtek-based USB Wi-Fi adapter — such as the ALFA AWUS036ACS (💻 RTL8812AU) or ALFA AWUS1900 (📡 RTL8814AU) — you may notice your adapter doesn't show up with iwconfig out of the box. This guide walks you through installing the correct drivers for these chipsets, step by step.
Not all Realtek chipsets are supported by the same drivers. For RTL8812AU, use the aircrack-ng/rtl8812au repository. For RTL8814AU, use the morrownr/8814au repository — it's more up to date and works better for that chipset (and also supports RTL8812AU).
Run the command:
lsusb
Look for a line like:
Once you know your chipset, follow the appropriate installation method below.
Run these commands:
sudo rm -rf /etc/udev/rules.d/8814au.rules
sudo rm -rf /lib/modules/$(uname -r)/kernel/drivers/net/wireless/88XXau*
sudo modprobe -r 88XXau
sudo depmod -a
sudo apt install -y dkms git build-essential libelf-dev linux-headers-$(uname -r)
git clone https://github.com/morrownr/8814au.git
cd 8814au
sudo ./install-driver.sh
sudo reboot
Run:
iwconfig # You should see wlan1 or similar
lsmod | grep 8814au # You should see the driver loaded
sudo apt install build-essential libelf-dev linux-headers-$(uname -r) dkms -y
cd /usr/src/
sudo git clone https://github.com/aircrack-ng/rtl8812au.git
sudo dkms add ./rtl8812au
sudo dkms build 8812au/5.6.4.2
sudo dkms install 8812au/5.6.4.2
sudo reboot
iwconfig
lsusb
If you want to install everything in one command (for RTL8812AU only), run:
sudo apt install -y dkms build-essential libelf-dev linux-headers-$(uname -r) && git clone https://github.com/aircrack-ng/rtl8812au.git && cd rtl8812au && make && sudo make install && sudo depmod -a && echo "88XXau" | sudo tee -a /etc/modules && echo 'ACTION=="add", SUBSYSTEM=="usb", ATTR{idVendor}=="0bda", ATTR{idProduct}=="8813", RUN+="/sbin/modprobe 88XXau"' | sudo tee /etc/udev/rules.d/8814au.rules && sudo udevadm control --reload-rules && sudo udevadm trigger
Once your Realtek adapter is working, you can:
Need help setting up monitor mode or using Kismet? Reach out or check out the full Wireless Pentesting Toolkit Guide.
Explore my open-source projects, tools, and experiments. From cybersecurity tools to CLI utilities—everything built with a focus on automation, data analysis, and digital freedom.
GitHub: @Ringmast4r
Network Attack Visualization
Educational cybersecurity tool that visualizes network attacks on a 3D ASCII globe. Real-time firewall log analysis with IP geolocation, threat intelligence, and interactive terminal dashboard. 100% local and defensive.
Surveillance Camera Network Map
Surveillance camera network map - 336K+ cameras worldwide with inter-agency data sharing visualization. Interactive mapping of public surveillance infrastructure.
Global Data Center Mapping Project
ATLAS (All The Locations of All Servers) - Global data center mapping project with 6,266+ verified locations across 155 countries. Comprehensive OSINT dataset with interactive world map and geospatial intelligence.
Path Traversal & Directory Enumeration
Advanced path traversal and directory enumeration tool for security research and penetration testing. Built with Go for high-performance scanning.
Cross-Platform MAC Spoofing Utility
Cross-platform MAC address spoofing tool with GUI and CLI. Features 45+ vendor presets, 11 color themes, real-time stats, and one-click toggle. For network testing, privacy protection, and security research.
Real-time GPS Satellite Tracker
Real-time GPS satellite tracker - Educational visualization tool for tracking GNSS satellite positions and coverage across the globe.
OSINT Visualization Demo
Mock OSINT visualization tool demo with client-side search functionality. Features interactive radial charts, source filtering, confidence metrics, and grouped result cards. Fully synthetic data for demonstration.
MAC Address Manufacturer Lookup
The most comprehensive MAC address manufacturer lookup database - 49,059+ vendors from IEEE, Nmap, and Wireshark. One master list to rule them all.
Community Hardware Resource
Community support resource for Higole Gole 1 Pro 5.5" Industrial Tablet Mini PC. Hardware specs, Windows/Linux setup guides, WiFi drivers, temperature management, and compatibility documentation.
Command-Line Philosophy Tool
An interactive CLI app to read The Art of War with crimson brushstroke theme and dynamic splash animations. Terminal-based wisdom on demand.
Automated Safety Mechanism
Dead Man's Trigger - Automated safety switch that sends encrypted messages if you fail to check in. Server-powered with automatic email delivery via SendGrid. Perfect for journalists, activists, and security researchers.
Universal Wardriving File Converter
Universal wardriving file converter - supports 12+ formats (WiGLE, Kismet, KML), cross-platform, batch processing. Convert between any wardriving data format.
WiGLE Data Backup Tool
Download all your WiGLE wardriving data in one command. Simple Python tool for backing up your WiFi survey history.
US Police Surveillance Map
Interactive map of US police surveillance capabilities. Track and visualize law enforcement surveillance infrastructure across the United States.
CSV File Merger
Merge multiple CSV files into one mega CSV. Simple, fast, offline. Handles huge files with smart header detection and batch processing.
Narrative Adventure Game
Narrative adventure combining The Matrix and Alice in Wonderland. Terminal text game with 5 endings, philosophical choices, ANSI color effects, and no external dependencies.
Interactive Fiction Adaptation
Interactive fiction adaptation of the 1930 book "Consider the Consequences" - the first choose-your-own-adventure game. Python-based with 89 story segments, 3 characters, 43 decision points, and 83+ unique endings.
Advanced Research Tool
Advanced search interface for the Library of Congress digital collections with specialized filters, batch download capabilities, and comprehensive metadata extraction.
Follow @Ringmast4r for updates.
Technical guides, tutorials, and explorations into hacker culture, hardware modifications, and security research.
📝 Medium: @ringmast4r
Medium • Technical Guide
A deep dive into breathing new life into vintage hardware by integrating modern components and software. Explore techniques for modernizing legacy systems while preserving their authentic character—from retrofitting old terminals with Raspberry Pi internals to running contemporary software on classic computing platforms.
Medium • Wardriving Tutorial
Complete guide to setting up Kismet wireless monitoring with the Hak5 Wi-Fi Coconut multi-radio capture device. Learn how to configure GPS integration, optimize capture settings for multiple radios simultaneously, and leverage the Coconut's unique capabilities for comprehensive wireless network mapping and security research.
More articles coming soon. Follow @ringmast4r on Medium for updates.