Prey v1.13.33

Prey is an anti-theft and device tracking application for Windows that locates missing laptops via GPS and Wi-Fi geolocation, with remote lock and data wipe.

Updated May 20, 2026
Free · Freeware
4,066 downloads
85.98 MB
3.7
Good 3 user ratings
Listed in our directory since 2026
Official download source: Preyproject
Last updated May 22, 2026

Overview

A laptop goes missing from a coffee shop table. A phone is stolen on a crowded train. A hotel room is minus one tablet. In each case the owner asks the same question: where is it now, and is there any way to get it back? Prey answers that question for devices running nearly any operating system, and it does so from a single account that ties together a person’s entire hardware collection. The free version handles up to three devices, which is fine for most households.

Unlike the tracking tools native to Apple and Google ecosystems, Prey doesn’t care what brand or operating system a device runs on. Find My exclusively works between Apple products. Google’s equivalent lives inside Android. Otherwise, a person carrying an iPhone, working on a Windows laptop and keeping an Android tablet at home would need three separate tracking systems. Prey covers all three at once, plus Linux machines and Chromebooks, and displays them all together on a single map.

The Control Panel for the Web

In Prey, everything runs through a control panel in a browser, not the app on the device itself. This matters for the obvious reason – if a phone has been stolen, the owner is not going to operate it from the phone. The panel lists all enrolled devices, displays the last known location of each one, and provides controls for marking a device missing, triggering actions, and reviewing the evidence reports that come back. From any computer or browser, a person logs in and controls their devices remotely.

Evidence Reports

Setting a device to missing turns Prey on to reporting mode. From that point, the device sends back periodic reports, and the contents of those reports are built around one purpose: giving police enough to act on. The report includes the device’s GPS coordinates, silent photos from both cameras, screenshots of whatever’s on the display, names of nearby Wi-Fi networks to triangulate position more precisely, and the MAC and IP addresses that prove the hardware is the one reported stolen. Prey publishes recovery stories from users whose devices were returned specifically because these reports gave law enforcement an address and a face to work with.

Location Techniques

GPS does location on devices that have the hardware and a strong enough signal . Prey uses Wi-Fi positioning to locate the device when it has no GPS signal, such as indoors or on a device without GPS hardware, by reading the nearby wireless networks and cross-referencing with databases that map those networks to real-world locations. The two methods together cover situations where one alone would fail: a laptop indoors with no GPS chip still reports a usable location through the Wi-Fi networks around it.

Action at a Distance

The immediate response to a theft involves three remote actions. The device is locked behind a password so that the person holding it cannot use it. An alarm sounds at full volume no matter if the device is on silent, which flushes out a misplaced phone in a couch or warns a thief that the device is being tracked. A message appears on the locked screen – handy if you want to post a contact number on a properly lost device, or if you want to let a thief know that the authorities are involved.

Geofencing

Control Zones encircle geographic boundaries around places that matter – a home, an office, a campus. When you cross the boundary it sends an automatic alert. The feature works without first declaring a device missing, so an unexpected departure from the designated area becomes the first warning that something is wrong instead of a discovery made hours later.

Premium Protection

The paid tiers include actions that find hardware, not just protect data. Remote wipe deletes sensitive files from a device that’s not coming back. File retrieval takes specific documents off the device for wiping or for evidence. Organizations with large numbers of company devices get mass deployment and management tools that extend the same protections to an entire fleet from a central administrative view.

Android-specific protections

Prey on Android detects a SIM card swap — a common move by thieves trying to cut off tracking — and reports it. The Device Admin permission prevents unauthorized users from deleting the app, but allows the actual owner to delete it normally. The remote lock disables other apps only by Android’s Accessibility Service and does not listen to audio or takes content from other apps.