Alfa100001 / -CVE-2017-0785-BlueBorne-PoCLinks
CVE-2017-0785 BlueBorne PoC
☆40Updated 8 years ago
Alternatives and similar repositories for -CVE-2017-0785-BlueBorne-PoC
Users that are interested in -CVE-2017-0785-BlueBorne-PoC are comparing it to the libraries listed below
Sorting:
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆54Updated 7 years ago
- Automated Application Generation for Stack Overflow Types on Wireless Routers☆54Updated 6 years ago
- Blueborne CVE-2017-1000251 PoC for linux machines☆17Updated 2 years ago
- Bluetooth scanner for local devices that may be vulnerable to Blueborne exploit☆154Updated 8 years ago
- Broadpwn bug (CVE-2017-9417)☆52Updated 8 years ago
- PoC exploit for arbitrary file read/write in locked Samsung Android device via MTP (SVE-2017-10086)☆168Updated 7 years ago
- Scan/Exploit Blueborne CVE-2017-0785☆30Updated 7 years ago
- UPnP hacking scripts and tools☆76Updated 8 years ago
- Tool used for dumping memory from Android devices☆68Updated 10 years ago
- A GUI-based USB device fuzzer☆64Updated 8 years ago
- Network based protocol fuzzer☆74Updated 3 years ago
- Patch for hostapd and wpa_supplicant to attempt to exploit heartbleed on EAP-PEAP/TLS/TTLS connections☆106Updated 11 years ago
- Krack POC☆125Updated 7 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆33Updated 3 years ago
- Bluetooth PIN and LINK-KEY Cracker☆51Updated 11 years ago
- Automated Information Retrieval From APKs For Initial Analysis☆32Updated 8 years ago
- Slides from my talk at ISC 2018 in Beijing 2018☆94Updated 6 years ago
- This is a POC for the Fortigate OS Backdoor found in version 4.x up to 5.0.7☆28Updated 9 years ago
- Android Hacking Event 2017 Write-up☆45Updated 8 years ago
- Blueborne CVE-2017-0781 Android heap overflow vulnerability☆143Updated 4 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆37Updated 8 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- Automatically exported from code.google.com/p/miranda-upnp☆68Updated 8 years ago
- Encrypting a PNG into an Android application☆68Updated 6 years ago
- Simple framework to extract "actionable" data from Android malware (C&Cs, phone numbers etc.)☆109Updated 10 years ago
- PoC Exploiting Permission Bypass in Android's Download Provider (CVE-2018-9468)☆20Updated 5 years ago
- iPhone security labs☆61Updated 14 years ago
- Linux tool used to extract sensitive data, inject backdoor or drop remote shells on android devices.☆109Updated 9 years ago
- A modified frequency regulatory domain configuration that doesn't limit you.☆177Updated 8 years ago
- The router hacking repo.☆33Updated 10 years ago