Bluetooth-LE-Spam is a project made by simondankelmann, you can get it from his Repositories: https://github.com/simondankelmann/Bluetooth-LE-Spam
☆32Nov 12, 2023Updated 2 years ago
Alternatives and similar repositories for Bluetooth-LE-Spam
Users that are interested in Bluetooth-LE-Spam are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Emensta'sToolKit is a multifunctinal Kit with tools for checking, and doing several things with a network and it's devices. The tool will…☆58Jul 10, 2024Updated last year
- DDoS attacks serve malicious purposes, such as disrupting online services, causing financial losses, damaging reputation, or as a smokesc…☆74Sep 6, 2023Updated 2 years ago
- A 2.4GHz and 5GHZ Deauther, based on a RTL8720dn BW16 dev kit.☆309Oct 27, 2025Updated 5 months ago
- https://github.com/bigbrodude6119/flipper-zero-evil-portal.git☆12Oct 7, 2023Updated 2 years ago
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender☆23Nov 20, 2022Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Python TCP reverse shell & persistence & exe & more! (Also with YouTube tuturial)☆16Jun 14, 2020Updated 5 years ago
- A simple flashable zip to switch between LineageOS and Sailfish OS boots☆11Dec 7, 2020Updated 5 years ago
- restart adbd with root privileges☆11Oct 21, 2015Updated 10 years ago
- Control a system remotely via telegram in Powershell☆14Mar 28, 2025Updated last year
- A stealthy Python dark web scraper using Tor. Crawl .onion sites anonymously, with retries, rate-limiting, and automatic Tor circuit rene…☆73Aug 5, 2025Updated 8 months ago
- Introduction to Reverse Engineering Training☆11Apr 22, 2015Updated 10 years ago
- Library for reading and writing dex files☆31Updated this week
- Threat Hijacking Simple Implementation☆22Feb 24, 2025Updated last year
- A longitudinal dataset for academic literature, including papers, metadata, and citation graphs, Also available on 🤗 HuggingFace and Kag…☆17Sep 6, 2025Updated 7 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆10Dec 27, 2022Updated 3 years ago
- BIOS Workshop 2023☆26Nov 15, 2023Updated 2 years ago
- C++ keylogger to save all the keys pressed into a local txt file☆11Apr 6, 2023Updated 3 years ago
- Rust bot that works on IRC and Slack for tracking karma (upvotes/downvotes...)☆18Mar 13, 2025Updated last year
- A modular Python bot that integrates with Discord☆54Jan 9, 2023Updated 3 years ago
- ☆10Aug 9, 2024Updated last year
- a recon framework that facilitates discovering, scanning and monitoring assets trough a configurable engine running on serverless aws inf…☆12Aug 26, 2024Updated last year
- Rust implementation of the Hyperion Ambient Lighting software☆12Apr 11, 2026Updated last week
- Script that can scrape and add members in your Telegram Group.☆12Nov 4, 2023Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs —without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- WiFi Pineapple MK6 updated content repo☆40Mar 3, 2026Updated last month
- VSS: A Storage System for Video Analytics☆13Jul 9, 2021Updated 4 years ago
- A comprehensive Delphi implementation of reverse SSH tunneling with integrated SOCKS5 proxy capabilities, enabling secure remote access t…☆16Mar 10, 2026Updated last month
- Hello World examples in assembly, for use as templates.☆12Jan 18, 2026Updated 3 months ago
- A proof‑of‑concept C2 framework that uses Server‑Sent Events (SSE) and the MCP protocol for agent registration, command dispatch, and res…☆34Apr 28, 2025Updated 11 months ago
- SSH Bruteforce Basic Script created with C++ to Linux☆10Jan 28, 2023Updated 3 years ago
- LAN Orchestrated Key Infiltrator - Autonomous network recon payload for the Hak5 WiFi Pineapple Pager — inspired by Bjorn, rebuilt with t…☆128Apr 7, 2026Updated last week
- Code related to the paper "MobileMEF: Fast and Efficient Method for Multi-Exposure Fusion"☆12Dec 14, 2024Updated last year
- Post-Exploitation Tool to Steal MySQL Data, and with persistence extract all data from MySQL table every time that Windows are opened wit…☆14Apr 2, 2023Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- nVidia Shield TV fastboot bootloader☆14Dec 5, 2018Updated 7 years ago
- EVM Emergency wallet drainer☆12Aug 2, 2023Updated 2 years ago
- Refactor your software using programming language independent, case-preserving string replacement☆17Jul 9, 2019Updated 6 years ago
- A standalone elliptic curve/AES file encryption and decryption device☆17Jun 28, 2023Updated 2 years ago
- symbolic execution engine for brainfuck because lol☆14Feb 5, 2017Updated 9 years ago
- TeaVin - Ultimate ESP32 EvilTwin☆13Mar 25, 2024Updated 2 years ago
- The main program for PIXEL: LED ART which runs animated gifs☆17Oct 15, 2023Updated 2 years ago