MarketStreetCyber / BlabberLinks
Phone bluetooth suite that can track and prompt user notification
☆17Updated last year
Alternatives and similar repositories for Blabber
Users that are interested in Blabber are comparing it to the libraries listed below
Sorting:
- OSDP attack tool (and the Elvish word for friend)☆100Updated last year
- Bluetooth Security Assessment Methodology☆132Updated last year
- External Playbooks for Public Access☆39Updated 6 months ago
- All kinds of tiny shells☆58Updated 2 years ago
- A BYOSI (Bring-Your-Own-Script-Interpreter) Rapid Payload Deployment Toolkit☆91Updated last year
- Secret Scanner for Slack, Jira, Confluence, Asana, Wrike, Linear, Zendesk, GitHub, and GitLab☆65Updated last month
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated 9 months ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆52Updated last year
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆121Updated last year
- Card calculator and Proxmark3 Plugin for writing and/or simulating every card type that Doppelgänger Community, Pro, Stealth, and MFAS su…☆21Updated 8 months ago
- Hascat Rules Collection – Probably the largest collection of hashcat rule-files anywhere.☆102Updated 7 months ago
- This is a collection of tools that make up what we call a "Drop-Pi", primarily used as a quick placement device during a physical/social …☆33Updated 10 months ago
- DEFCON 30 Mainframe buffer overlow workshop container☆90Updated last year
- Generate a report with charts and statistics about cracked passwords in XLSX format☆33Updated 5 months ago
- Extract credentials and other useful info from network captures☆70Updated 2 years ago
- Flipper Zero firmware source code + Dict attack improvements☆61Updated 2 years ago
- Team hashcat event writeups and tools☆50Updated last week
- Full Build Guide for making your own RFID Gooseneck Long Range Reader!☆54Updated this week
- Hashcat wrapper for attack chain automation and enhanced wordlist generation☆22Updated 2 months ago
- A simple scanner for identifying vulnerable cups-browsed instances on your network☆61Updated 10 months ago
- Diana Credential Recovery Framework☆59Updated last month
- A collection of tools that I use in CTF's or for assessments☆102Updated 6 months ago
- Artifact monitoring that ensures fairplay☆77Updated 6 months ago
- eXtensions for Financial Services (XFS) proof of concept client to explore and issue commands directly to the devices that support the pr…☆83Updated 4 years ago
- A public, open source physical security methodology☆46Updated last year
- Hijack a slack bot to phish your way in☆56Updated 3 weeks ago
- ☆77Updated last year
- tool for identifying guest relationships between companies☆101Updated last year
- ☆23Updated 4 months ago
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆66Updated last year