MarketStreetCyber / BlabberLinks
Phone bluetooth suite that can track and prompt user notification
☆17Updated last year
Alternatives and similar repositories for Blabber
Users that are interested in Blabber are comparing it to the libraries listed below
Sorting:
- OSDP attack tool (and the Elvish word for friend)☆107Updated 2 years ago
- Full Build Guide for making your own RFID Gooseneck Long Range Reader!☆61Updated 3 months ago
- Hashcat wrapper for attack chain automation and enhanced wordlist generation☆25Updated 2 months ago
- Card calculator and Proxmark3 Plugin for writing and/or simulating every card type that Doppelgänger Community, Pro, Stealth, and MFAS su…☆25Updated last month
- Code associated with the talk "Blue2thprinting (blue-[tooth)-printing]: answering the question of 'WTF am I even looking at?!'"☆56Updated 2 weeks ago
- PASSWORDS, NED! IN AN OPEN FIEEEELD!!☆21Updated last year
- Bluetooth Security Assessment Methodology☆139Updated last year
- Damn Vulnerable CICS Application☆29Updated last year
- RattaGATTa: Scalable Bluetooth Low-Energy Survey Using a pool of collectors to scan and connect to BTLE devices, shedding light on the in…☆42Updated 10 months ago
- DEFCON 30 Mainframe buffer overlow workshop container☆92Updated last year
- All kinds of tiny shells☆58Updated 2 years ago
- Legba recipes.☆51Updated last year
- A VS Code extension to preview XML nmap output☆44Updated 9 months ago
- Doppelgänger is firmware that runs on ESP32 devices that can be embedded within commercially available RFID readers with the intent of ca…☆20Updated last year
- A public, open source physical security methodology☆46Updated last year
- eXtensions for Financial Services (XFS) proof of concept client to explore and issue commands directly to the devices that support the pr…☆87Updated 5 years ago
- Yoink is a quick tool for use with Obsidian that will allow you to take a markdown file and package it up into a folder that will allow y…☆15Updated 2 years ago
- tool for identifying guest relationships between companies☆103Updated last year
- Gain another host's network access permissions by establishing a stateful connection with a spoofed source IP☆83Updated 6 months ago
- A user enumeration tool for Slack.☆34Updated last year
- Diana Credential Recovery Framework☆63Updated 2 months ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆53Updated last year
- Flipper Zero firmware source code + Dict attack improvements☆61Updated 2 years ago
- ☆42Updated last year
- A BYOSI (Bring-Your-Own-Script-Interpreter) Rapid Payload Deployment Toolkit☆113Updated last year
- Tools for maintaining access to systems and proof-of-concept demonstrations.☆175Updated 7 months ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆127Updated last year
- ☆14Updated 11 months ago
- Living Under the Land on Linux ~ BSides Belfast 2025☆34Updated this week
- CrackerJack / Hashcat Web Interface / Context Information Security☆62Updated 7 months ago