PoC scripts demonstrating the BlueBorne vulnerabilities
☆611May 17, 2021Updated 4 years ago
Alternatives and similar repositories for blueborne
Users that are interested in blueborne are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Purpose only! The dangers of Bluetooth implementations: Unveiling zero day vulnerabilities and security flaws in …☆283Aug 23, 2021Updated 4 years ago
- Blueborne CVE-2017-0785 Android information leak vulnerability☆468Sep 23, 2017Updated 8 years ago
- ☆160Jan 31, 2018Updated 8 years ago
- Bluetooth scanner for local devices that may be vulnerable to Blueborne exploit☆160Sep 18, 2017Updated 8 years ago
- some vul☆790Apr 25, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A list of my CVE's with POCs☆683Dec 15, 2020Updated 5 years ago
- kernel privilege escalation enumeration and exploitation framework☆702Aug 2, 2018Updated 7 years ago
- This repository is DEPRECATED, please use bettercap as this tool has been ported to its BLE modules.☆1,095Feb 19, 2019Updated 7 years ago
- poc or exp of android vulnerability☆407Dec 30, 2017Updated 8 years ago
- ☆3,497Dec 25, 2024Updated last year
- ☆190Oct 25, 2017Updated 8 years ago
- Metaphor - Stagefright with ASLR bypass☆316Mar 24, 2016Updated 10 years ago
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆726Nov 19, 2017Updated 8 years ago
- Proof-of-Concept exploits for CVE-2017-11882☆495Nov 29, 2017Updated 8 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- BtleJuice Bluetooth Smart (LE) Man-in-the-Middle framework☆836Oct 3, 2018Updated 7 years ago
- Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆312Sep 10, 2018Updated 7 years ago
- The dangers of Bluetooth implementations: Unveiling zero day vulnerabilities and security flaws in modern Bluetooth stacks.☆36Sep 30, 2024Updated last year
- Writing PoC for fun and educate people take security seriously;-)☆142Dec 31, 2018Updated 7 years ago
- A Node.js package for BLE (Bluetooth Low Energy) security assessment using Man-in-the-Middle and other attacks☆821Jan 31, 2022Updated 4 years ago
- My proof-of-concept exploits for the Linux kernel☆1,574Sep 11, 2025Updated 7 months ago
- "Opening Pandora's Box through ATFuzzer: Dynamic Analysis of AT Interface for Android Smartphones" ACSAC 2019☆156Mar 28, 2021Updated 5 years ago
- Some kernel fuzzing paper about windows and linux☆255Oct 9, 2017Updated 8 years ago
- Collection of scripts and templates to generate Office documents embedded with the DDE, macro-less command execution technique.☆638Jul 16, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- The slides and exploit of mosec2016☆112Jul 4, 2016Updated 9 years ago
- ☆571May 30, 2018Updated 7 years ago
- A Javascript library for browser exploitation☆898Feb 12, 2019Updated 7 years ago
- PoC code for CVE-2017-13253☆37Oct 1, 2020Updated 5 years ago
- Android APK analyzer based on radare2 and others.☆154Apr 9, 2020Updated 6 years ago
- Fuzzer for Linux Kernel Drivers☆384Apr 30, 2022Updated 4 years ago
- A POC for the Huge Dirty Cow vulnerability (CVE-2017-1000405)☆202Nov 30, 2017Updated 8 years ago
- CVE-2017-8759 - A vulnerability in the SOAP WDSL parser.☆176Sep 14, 2017Updated 8 years ago
- Car Backdoor Maker☆220Oct 1, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Proof-of-Concept exploit for CVE-2017-7494(Samba RCE from a writable share)☆181Jul 26, 2017Updated 8 years ago
- jemalloc heap exploitation framework☆466Nov 29, 2021Updated 4 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆307Jan 12, 2023Updated 3 years ago
- Encrypted exploit delivery for the masses☆271Sep 25, 2019Updated 6 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,463Nov 3, 2018Updated 7 years ago
- iOS 11.1.2 (15B202) Jailbreak☆440Apr 6, 2021Updated 5 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆496Sep 21, 2021Updated 4 years ago