MarketStreetCyber / BlabberLinks
Phone bluetooth suite that can track and prompt user notification
☆17Updated last year
Alternatives and similar repositories for Blabber
Users that are interested in Blabber are comparing it to the libraries listed below
Sorting:
- OSDP attack tool (and the Elvish word for friend)☆103Updated 2 years ago
- Bluetooth Security Assessment Methodology☆136Updated last year
- Hascat Rules Collection – Probably the largest collection of hashcat rule-files anywhere.☆115Updated 9 months ago
- Code associated with the talk "Blue2thprinting (blue-[tooth)-printing]: answering the question of 'WTF am I even looking at?!'"☆48Updated 2 weeks ago
- Hashcat wrapper for attack chain automation and enhanced wordlist generation☆23Updated 3 weeks ago
- Card calculator and Proxmark3 Plugin for writing and/or simulating every card type that Doppelgänger Community, Pro, Stealth, and MFAS su…☆25Updated this week
- A BYOSI (Bring-Your-Own-Script-Interpreter) Rapid Payload Deployment Toolkit☆94Updated last year
- Full Build Guide for making your own RFID Gooseneck Long Range Reader!☆54Updated 2 months ago
- Script to perform some hashcracking logic automagically☆74Updated last month
- This is a collection of tools that make up what we call a "Drop-Pi", primarily used as a quick placement device during a physical/social …☆34Updated last year
- A public, open source physical security methodology☆46Updated last year
- Legba recipes.☆49Updated last year
- Gain another host's network access permissions by establishing a stateful connection with a spoofed source IP☆82Updated 4 months ago
- DEFCON 30 Mainframe buffer overlow workshop container☆90Updated last year
- A collection of tools that I use in CTF's or for assessments☆102Updated 8 months ago
- A tool for automating WPA3-Transition Mode Downgrade Attack also known as Dragonblood Vulnerability☆36Updated last year
- Secret Scanner for Slack, Jira, Confluence, Asana, Wrike, Linear, Zendesk, GitHub, and GitLab☆68Updated 2 weeks ago
- ☆78Updated last year
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated last year
- Tool for analyzing SAP Secure Network Communications (SNC).☆52Updated last year
- Proximity is a MCP security scanner powered with NOVA☆45Updated 2 weeks ago
- ☆22Updated 11 months ago
- Generate a report with charts and statistics about cracked passwords in XLSX format☆34Updated 7 months ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆126Updated last year
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆132Updated last year
- All kinds of tiny shells☆58Updated 2 years ago
- Generate graphs and charts based on password cracking result☆162Updated 2 years ago
- Create n-grams of wordlists based on words, characters, or charsets to use in offline password attacks and data analysis☆35Updated last year
- External Playbooks for Public Access☆39Updated 8 months ago
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing☆51Updated 7 months ago