MarketStreetCyber / BlabberLinks
Phone bluetooth suite that can track and prompt user notification
☆17Updated last year
Alternatives and similar repositories for Blabber
Users that are interested in Blabber are comparing it to the libraries listed below
Sorting:
- Bluetooth Security Assessment Methodology☆143Updated last year
- OSDP attack tool (and the Elvish word for friend)☆108Updated 2 years ago
- A public, open source physical security methodology☆47Updated last year
- Hashcat wrapper for attack chain automation and enhanced wordlist generation☆26Updated 3 months ago
- Card calculator and Proxmark3 Plugin for writing and/or simulating every card type that Doppelgänger Community, Pro, Stealth, and MFAS su…☆25Updated 2 weeks ago
- DEFCON 30 Mainframe buffer overlow workshop container☆92Updated last year
- External Playbooks for Public Access☆40Updated 11 months ago
- Code associated with the talk "Blue2thprinting (blue-[tooth)-printing]: answering the question of 'WTF am I even looking at?!'"☆65Updated 2 months ago
- Extract credentials and other useful info from network captures☆75Updated 3 years ago
- All kinds of tiny shells☆65Updated 2 years ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated last year
- Generate a report with charts and statistics about cracked passwords in XLSX format☆36Updated last month
- Collection of hashcat lists and things.☆51Updated 6 years ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆56Updated last year
- Script to perform some hashcracking logic automagically☆80Updated last month
- Writeup for the DEF CON 30 badge challenge☆72Updated 3 years ago
- gubble is a tool designed to audit Google Workspace group settings. It analyzes settings such as who can join, view membership, post mess…☆79Updated 7 months ago
- RattaGATTa: Scalable Bluetooth Low-Energy Survey Using a pool of collectors to scan and connect to BTLE devices, shedding light on the in…☆45Updated 11 months ago
- Generate graphs and charts based on password cracking result☆162Updated 2 years ago
- Damn Vulnerable CICS Application☆29Updated last year
- Gain another host's network access permissions by establishing a stateful connection with a spoofed source IP☆84Updated 7 months ago
- A collection of tools that I use in CTF's or for assessments☆104Updated 11 months ago
- A simple scanner for identifying vulnerable cups-browsed instances on your network☆65Updated last year
- Diana Credential Recovery Framework☆65Updated this week
- Legba recipes.☆51Updated last year
- eXtensions for Financial Services (XFS) proof of concept client to explore and issue commands directly to the devices that support the pr…☆89Updated 5 years ago
- tool for identifying guest relationships between companies☆103Updated last year
- ☆76Updated last year
- Full Build Guide for making your own RFID Gooseneck Long Range Reader!☆61Updated 5 months ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Updated last year