Werejugo
Identifies physical locations where a laptop has been based upon wireless profiles and wireless data recorded in event logs
Install / Use
/learn @MarkBaggett/WerejugoREADME
werejugo
Version 0.9 - beta
Identifies physical locations where a laptop has been based upon multiple forensics artifacts on host. Including
- Wireless Profiles in SOFTWARE registry hive
- Wireless SSID from WLAN_AUTOCONFIG Application Event logs
- Wireless Diagnostic Event ID 6100 in SYSTEM.EVTX
- Wireless Profile Names from SRUM.DAT
To run this tool you need three files from this github repo. Werejugo.exe werejugo.yaml and template.html. Download them and place them in a directory.
You must edit werejugo.yaml and give it some API keys. This tool requires that you provide both a wigle.net API key and a Google Geolocation API key. Place those keys in the werejugo.yaml configuration file. The google API key requires a credit card but the first several thousand requests per month are free so you can experiment with the tool with out incurring a cost.
Run the tool with administrative privileges on the target laptop for live aquistion of required files. Auto file aquisition will only work on systems that have a version of esentutl.exe that supports extracting unlocked files. If automatic acquisition fails then use another forensics tool to extract the locked files.
If you have a forensics image with unlocked files then you can browse to those files manually.

Related Skills
node-connect
352.0kDiagnose OpenClaw node connection and pairing failures for Android, iOS, and macOS companion apps
frontend-design
111.1kCreate distinctive, production-grade frontend interfaces with high design quality. Use this skill when the user asks to build web components, pages, or applications. Generates creative, polished code that avoids generic AI aesthetics.
openai-whisper-api
352.0kTranscribe audio via OpenAI Audio Transcriptions API (Whisper).
qqbot-media
352.0kQQBot 富媒体收发能力。使用 <qqmedia> 标签,系统根据文件扩展名自动识别类型(图片/语音/视频/文件)。
