0x646e78 / bluesniffLinks
Bluesniff
☆86Updated 10 years ago
Alternatives and similar repositories for bluesniff
Users that are interested in bluesniff are comparing it to the libraries listed below
Sorting:
- Bluetooth Honeypot☆261Updated 4 years ago
- Sets Transparent proxy tunnel through Tor, I2P, Privoxy, Polipo and modify DNS; Include Anonymizing Relay Monitor (arm), macchanger and w…☆314Updated 3 years ago
- Hostapd fork including Wi-Fi attacks and providing Python bindings with ctypes.☆183Updated 4 years ago
- bettercap's web UI☆348Updated 2 months ago
- Manipulate Chromecast Devices in your Network☆248Updated 5 years ago
- The Bluetooth penetration testing tool suite☆124Updated 5 years ago
- An automated Wireless RogueAP MITM attack framework.☆185Updated 6 years ago
- A Linux Packet Sniffing Suite for Automated MiTM Attacks☆245Updated last year
- Adds ability to successfully login into websites that have a delay after login and adds directory of chromedriver, this fork was used in …☆155Updated 3 years ago
- The `anonymous` script from ParrotSec OS and BackBox Linux, perfected to run on Kali Linux Rolling. Run the script with `sudo sh script.…☆124Updated 5 years ago
- A simple wordlists generator and mangler written in Python 3.10.1.☆124Updated last year
- DMitry (Deepmagic Information Gathering Tool)☆231Updated last week
- Community-built scenarios for Wifiphisher☆369Updated 4 years ago
- Control remote computers using discord bot and python 3.☆182Updated 3 years ago
- Curated archive of tools from the Wikileaks CIA hacking tool leak, pull requests welcome https://wikileaks.org/ciav7p1/☆125Updated 8 years ago
- Browser Exploitation Framework is a Open-source penetration testing tool that focuses on browser-based vulnerabilities .This Python Scrip…☆162Updated last year
- A statistically optimized USB rubber ducky payload to brute force 4-digit Android PINs.☆207Updated 10 years ago
- the best and small passwords lists to crack handshake wpa-wpa2☆79Updated 4 years ago
- An automated script for deauthentication attack☆271Updated 5 years ago
- Automated rogue access point setup tool.☆198Updated 4 years ago
- WARNING: do not actually execute this. You will not be able to recover your files☆52Updated 6 years ago
- A framework for pentesters that facilitates evil twin attacks as well as exploiting other wifi vulnerabilities☆321Updated last year
- Extra captive portals for captiveflask plugins of wifipumpkin3☆50Updated last year
- Python Aircrack-ng bindings☆125Updated last month
- A very flexible phone number wordlist generator☆69Updated last year
- Script made with Python, it shows the geolocation of a BSSID from an AP, using an API☆21Updated 7 years ago
- This is Jester ransomware like, in Mr Robot movie (coded by Darlene S1E2,3), Please beware warning, after start you can't recover the fil…☆391Updated 5 years ago
- Minimalist Asterisk Caller ID Spoofer and Secondary VOIP Line Configuration Built for AWS☆301Updated 5 years ago
- bluesnarfing proof-of-concept tool.☆54Updated 9 years ago
- A tool that serves as a Proof of Concept for the research I presented at DEF CON 26, "Compromising online accounts by cracking voicemail …☆160Updated last year