Blue Pigeon is a Bluetooth-based data exfiltration and proxy tool to enable communication between a remote Command and Control (C2) server and a compromised host.
☆55Jul 31, 2021Updated 4 years ago
Alternatives and similar repositories for blue-pigeon
Users that are interested in blue-pigeon are comparing it to the libraries listed below
Sorting:
- ☆69Oct 6, 2021Updated 4 years ago
- Emulate and Dissect MSF and *other* attacks☆143Feb 28, 2024Updated 2 years ago
- ☆44Aug 3, 2021Updated 4 years ago
- Cloud Security Operations Orchestrator☆188Apr 17, 2024Updated last year
- Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs …☆75Oct 30, 2023Updated 2 years ago
- High speed/Low cost CommonCrawl RegExp in Node.js☆256Apr 6, 2024Updated last year
- Phishing Framework for Pentesters☆200May 16, 2023Updated 2 years ago
- Set of tools for security testing of Internet of Things devices using specific network IoT protocols☆358May 31, 2024Updated last year
- ☆25Sep 17, 2025Updated 5 months ago
- Passive Security Tools Fingerprinting Framework☆75Mar 26, 2021Updated 4 years ago
- ☆16Aug 14, 2024Updated last year
- An open-source, real-time Security Information & Event Management tool based on big data technologies, providing a scalable, advanced sec…☆208Apr 3, 2025Updated 11 months ago
- Port Scapy to iOS☆28Feb 4, 2014Updated 12 years ago
- tlsplayback is a set of Proof of Concepts (PoC) showing real-world replay attacks against TLS 1.3 libraries and browsers by exploiting 0-…☆16Aug 11, 2018Updated 7 years ago
- Ransoblin (Ransomware Bokoblin)☆18Oct 4, 2020Updated 5 years ago
- 从入门到放弃的产物 ,学习过程中用python实现的一个单点c2基本功能☆11Mar 11, 2020Updated 5 years ago
- Offensive Terraform module which creates EC2 instance and reverse shell from an EC2 instance to attacker machine.☆16Sep 19, 2020Updated 5 years ago
- Automation Hacking & Penetration Testing Suite☆11Aug 12, 2016Updated 9 years ago
- Unlocking Serverless Computing to Assess Security Controls☆262Mar 15, 2024Updated last year
- BlueRepli-Plus☆18Jul 17, 2020Updated 5 years ago
- Tool for checking Whether a domain or its multiple sub-domains are up and running.☆72Jan 21, 2019Updated 7 years ago
- just a spider☆18Mar 20, 2018Updated 7 years ago
- BloodCheck enables Red and Blue Teams to manage multiple Neo4j databases and run Cypher queries against a BloodHound dataset.☆17Jun 20, 2021Updated 4 years ago
- Web app that provides basic navigation and annotation of ATT&CK matrices☆17Nov 7, 2020Updated 5 years ago
- PyQT5 app for LOLBAS and GTFOBins☆45May 3, 2022Updated 3 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆17Apr 13, 2015Updated 10 years ago
- A Cloud Security Posture Manager or CSPM with a focus on security analysis for the modern cloud stack and a focus on the emerging threat …☆199Aug 29, 2024Updated last year
- Transferring Backdoor Payloads with BMP Image Pixels☆83Jun 5, 2023Updated 2 years ago
- A little tool to play with Outlook☆207Nov 11, 2021Updated 4 years ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆21Mar 31, 2017Updated 8 years ago
- ☆21Nov 8, 2021Updated 4 years ago
- PurpleSharp is a C# adversary simulation tool that executes adversary techniques with the purpose of generating attack telemetry in monit…☆842Feb 23, 2026Updated 2 weeks ago
- Firebase Domain Front Code☆21May 4, 2021Updated 4 years ago
- 扫描C段或B段常见的Web端口并提取title,程序内置常见的Web端口,可自行添加。Scan common web ports and extract titles. The built-in common web port can be added by yoursel…☆20Sep 13, 2018Updated 7 years ago
- ☆99Feb 16, 2021Updated 5 years ago
- German OWASP Day conference site & presentation archive☆24Feb 21, 2026Updated 2 weeks ago
- PhishingExploit☆24Sep 3, 2018Updated 7 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆291May 14, 2019Updated 6 years ago
- Domain user enumeration tool☆216Nov 2, 2023Updated 2 years ago