MS3FGX / Bluefog
Tool to create large numbers of phantom Bluetooth devices.
☆29Updated 11 years ago
Related projects ⓘ
Alternatives and complementary repositories for Bluefog
- Python - Human Interface Device Android Attack Framework☆36Updated 7 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 9 years ago
- Specify targets and run sets of tools against them☆11Updated 9 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆12Updated 7 years ago
- Software exploitation training material☆15Updated 7 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- flood area with fake essids☆20Updated 7 years ago
- Optional plugins for MITMf☆15Updated 9 years ago
- Search Email Accounts (OWA) for Passwords, PAN numbers as well as other Keywords☆39Updated 6 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆50Updated 7 years ago
- Bluetooth PIN and LINK-KEY Cracker☆47Updated 10 years ago
- SPIZZLE, The Onion Spider.☆13Updated 6 years ago
- giskismet – Wireless recon visualization tool☆48Updated 8 years ago
- Wi-Fi Backdoors☆37Updated 9 years ago
- A Gmail credential harvester☆9Updated 5 months ago
- UPnP hacking scripts and tools☆74Updated 7 years ago
- hostapd-mana for the 6.th gen. Wifi Pineapple, and OpenWRT☆21Updated 3 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆39Updated 9 years ago
- MiTM tools and scripts☆19Updated 9 years ago
- Simple (but working) WEP/WPA/WPA2 Hacking script☆29Updated 8 years ago
- A project inspired by BadUSB paper, USB Rubber Ducky and Samy Kamkar's project "USBDriveBy". Making the teensy microcontroller an evil li…☆12Updated 8 years ago
- Framework for Man-In-The-Middle attacks☆14Updated 6 years ago
- ☆11Updated 10 years ago
- Convert Windows Netmon Monitor Mode Wireless Packet Captures to Libpcap Format☆15Updated 5 years ago
- web information gathering / Grab links☆41Updated 5 years ago
- Simple Karma Attack☆66Updated 4 years ago
- Framework for obtaining all the credentials stored in vulnerable Netwave IP cameras. Can be used to break into IP cameras, use for resear…☆36Updated 4 years ago