MarketStreetCyber / BlabberLinks
Phone bluetooth suite that can track and prompt user notification
☆17Updated last year
Alternatives and similar repositories for Blabber
Users that are interested in Blabber are comparing it to the libraries listed below
Sorting:
- OSDP attack tool (and the Elvish word for friend)☆101Updated last year
- A public, open source physical security methodology☆46Updated last year
- Detect & filter duplicate hashcat rules☆44Updated 4 months ago
- ☆23Updated 2 months ago
- This is a collection of tools that make up what we call a "Drop-Pi", primarily used as a quick placement device during a physical/social …☆33Updated 7 months ago
- Create n-grams of wordlists based on words, characters, or charsets to use in offline password attacks and data analysis☆33Updated 11 months ago
- Card calculator and Proxmark3 Plugin for writing and/or simulating every card type that Doppelgänger Community, Pro, Stealth, and MFAS su…☆20Updated 6 months ago
- PASSWORDS, NED! IN AN OPEN FIEEEELD!!☆21Updated last year
- Analyze ARP requests to identify hosts that are communicating with one another.☆19Updated 5 years ago
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆33Updated 3 weeks ago
- Provides an overview of the inner file structure of a PDF☆25Updated 2 years ago
- All kinds of tiny shells☆58Updated 2 years ago
- Generate a report with charts and statistics about cracked passwords in XLSX format☆33Updated 3 months ago
- PwnPad is an affordable, hands-on hardware hacking platform built for practical learning. It features a range of challenges that walk use…☆42Updated this week
- wordlists for password cracking☆28Updated 2 years ago
- EGO is a vulnerability scanner developed by chickenpwny at PolitoInc. It was created to provide a platform for hackers to store multiple …☆28Updated 11 months ago
- A user enumeration tool for Slack.☆28Updated 11 months ago
- Gadget IoC removal from HAK5's BashBunny☆19Updated last year
- Bluetooth Security Assessment Methodology☆129Updated last year
- self-hosted Azure OSINT tool☆30Updated 9 months ago
- ☆12Updated 7 months ago
- Interactive terminal based tool to configure a Raspberry Pi into a transparent Wifi based proxy with traffic tunnelling support☆28Updated last year
- bowing to the AI Overlords.☆24Updated 5 months ago
- Purpose-built Red Team network hardware implant made from common components.☆22Updated 2 years ago
- Collaborative vulnerability database for Pentesting & Pwndoc-Ng☆20Updated 2 years ago
- Hijack a slack bot to phish your way in☆55Updated 2 months ago
- Converting your Burp Suite projects into JSON APIs which can be viewed with Swagger editor or imported into Postman.☆65Updated 6 months ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆47Updated 8 months ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆52Updated last year
- Doppelgänger is firmware that runs on ESP32 devices that can be embedded within commercially available RFID readers with the intent of ca…☆17Updated 6 months ago