MarketStreetCyber / BlabberLinks
Phone bluetooth suite that can track and prompt user notification
☆17Updated last year
Alternatives and similar repositories for Blabber
Users that are interested in Blabber are comparing it to the libraries listed below
Sorting:
- OSDP attack tool (and the Elvish word for friend)☆103Updated 2 years ago
 - Hashcat wrapper for attack chain automation and enhanced wordlist generation☆23Updated last month
 - A public, open source physical security methodology☆46Updated last year
 - Card calculator and Proxmark3 Plugin for writing and/or simulating every card type that Doppelgänger Community, Pro, Stealth, and MFAS su…☆25Updated 3 weeks ago
 - PASSWORDS, NED! IN AN OPEN FIEEEELD!!☆21Updated last year
 - Gain another host's network access permissions by establishing a stateful connection with a spoofed source IP☆82Updated 5 months ago
 - Bluetooth Security Assessment Methodology☆137Updated last year
 - Generate a report with charts and statistics about cracked passwords in XLSX format☆34Updated 8 months ago
 - Full Build Guide for making your own RFID Gooseneck Long Range Reader!☆60Updated 2 months ago
 - A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated last year
 - A BYOSI (Bring-Your-Own-Script-Interpreter) Rapid Payload Deployment Toolkit☆111Updated last year
 - DEFCON 30 Mainframe buffer overlow workshop container☆90Updated last year
 - Code associated with the talk "Blue2thprinting (blue-[tooth)-printing]: answering the question of 'WTF am I even looking at?!'"☆51Updated last week
 - Interactive results explorer and annotation tool for Nosey Parker☆38Updated 4 months ago
 - NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆68Updated last year
 - The following code when compiled in go takes a domain name as an argument and outputs an HTML file with Google Search links for various d…☆15Updated last year
 - Script to perform some hashcracking logic automagically☆76Updated 2 months ago
 - This is a collection of tools that make up what we call a "Drop-Pi", primarily used as a quick placement device during a physical/social …☆34Updated last year
 - Doppelgänger is firmware that runs on ESP32 devices that can be embedded within commercially available RFID readers with the intent of ca…☆20Updated 11 months ago
 - eXtensions for Financial Services (XFS) proof of concept client to explore and issue commands directly to the devices that support the pr…☆87Updated 4 years ago
 - Rebuild of portspoof in GO with additional features.☆21Updated last week
 - Living Under the Land on Linux ~ BSides Belfast 2025☆32Updated last month
 - Hijack a slack bot to phish your way in☆57Updated 3 months ago
 - Secret Scanner for Slack, Jira, Confluence, Asana, Wrike, Linear, Zendesk, GitHub, and GitLab☆69Updated 2 weeks ago
 - A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆127Updated last year
 - All kinds of tiny shells☆58Updated 2 years ago
 - Diana Credential Recovery Framework☆63Updated last month
 - Artifact monitoring that ensures fairplay☆78Updated 9 months ago
 - A powerful shell script for creating custom WSL (Windows Subsystem for Linux) distributions with embedded payloads.☆71Updated 2 months ago
 - Damn Vulnerable CICS Application☆27Updated last year