ArmisSecurity / blueborneLinks
PoC scripts demonstrating the BlueBorne vulnerabilities
☆600Updated 4 years ago
Alternatives and similar repositories for blueborne
Users that are interested in blueborne are comparing it to the libraries listed below
Sorting:
- Purpose only! The dangers of Bluetooth implementations: Unveiling zero day vulnerabilities and security flaws in …☆280Updated 3 years ago
- Blueborne CVE-2017-0785 Android information leak vulnerability☆465Updated 7 years ago
- Bluetooth scanner for local devices that may be vulnerable to Blueborne exploit☆152Updated 7 years ago
- SensePost's modified hostapd for wifi attacks.☆570Updated 10 months ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing☆357Updated 8 months ago
- PoC exploit for the CVE-2019-15126 kr00k vulnerability☆217Updated 5 years ago
- Python script to inject existing Android applications with a Meterpreter payload.☆645Updated last year
- Modified hostapd to facilitate AP impersonation attacks☆511Updated 7 years ago
- Proof-of-concept of the KRACK attack against Linux and Android☆154Updated 7 years ago
- Auto Root Exploit Tool☆531Updated 2 years ago
- caplets and proxy modules.☆502Updated 2 months ago
- *DEPRECATED* mana toolkit for wifi rogue AP attacks and MitM☆1,095Updated 6 years ago
- HomePwn - Swiss Army Knife for Pentesting of IoT Devices☆905Updated 2 years ago
- kernel privilege escalation enumeration and exploitation framework☆691Updated 6 years ago
- DNS spoofer. Drops DNS responses from the router and replaces it with the spoofed DNS response☆284Updated 8 years ago
- Krack POC☆126Updated 7 years ago
- Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.☆1,310Updated 3 years ago
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆726Updated 7 years ago
- Perform advanced MiTM attacks on websites with ease 💉☆676Updated last year
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆439Updated 7 years ago
- transform your payload.exe into one fake word doc (.ppt)☆468Updated 5 years ago
- This is a POC to show it is possible to capture enough of a handshake with a user from a fake AP to crack a WPA2 network without knowing …☆585Updated 3 years ago
- An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red te…☆293Updated 7 months ago
- Kautilya - Tool for easy use of Human Interface Devices for offensive security and penetration testing.☆861Updated 7 years ago
- ☆155Updated 7 years ago
- BtleJuice Bluetooth Smart (LE) Man-in-the-Middle framework☆793Updated 6 years ago
- SSLStrip version to defeat HSTS☆319Updated 7 years ago
- 📡🍓🍍 Detects wireless network attacks performed by KARMA module (fake AP). Starts deauthentication attack (for fake access points)☆254Updated 6 years ago
- Bluetooth hacking tools☆434Updated 2 years ago
- BadUSB 2.0 USB-HID MiTM POC☆284Updated 9 years ago