Mauddib28 / bleep-tool
Bluetooth Landscape Exploration & Enumeration Platform
☆47Updated last month
Related projects ⓘ
Alternatives and complementary repositories for bleep-tool
- A reconnaissance tool for capturing and displaying SSIDs from device's Preferred Network List.☆143Updated 2 months ago
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.☆46Updated this week
- Stalker, the Extensible Attack Surface Management tool.☆79Updated this week
- Pivot from a Twitter profile to Medium, Product Hunt, Mastodon, and more with OSINT☆34Updated 8 months ago
- A Powerful Network Reconnaissance Tool for Security Professionals☆96Updated 4 months ago
- Modular web-application honeypot platform built using go and gin☆54Updated 6 months ago
- AcSecurity is a Python module designed to scan applications for common security vulnerabilities. It checks for hardcoded secrets, depende…☆14Updated last week
- Static code analyser for backdoors and malicious code in git repos using OpenAI compatible LLM APIs☆69Updated 8 months ago
- A Pentest Collaboration and Reporting Tool☆50Updated this week
- The MSAK is a tool written in Python to help discovering and testing exposed standard and custom services of ModBus Servers/Slaves over S…☆17Updated 8 months ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆125Updated 11 months ago
- Email enumerator, username generator, and context validator for hunter.io, snov.io, and skrapp.io☆77Updated 3 months ago
- 📡 802.11 broadcast analyzer & injector☆128Updated last week
- Hastly written Tools & Scripts for Personal Use Cases & Bug Bounties☆72Updated this week
- a hackbot proof-of-concept☆34Updated 8 months ago
- Nuclei plugins to audit Chrome extensions☆64Updated 4 months ago
- Bluetooth Security Assessment Methodology☆110Updated 5 months ago
- God Mode Detection Rules☆131Updated 3 months ago
- hauditor is a tool designed to analyze the security headers returned by a web page.☆164Updated 4 months ago
- Identify hardcoded secrets in static structured text (version 2)☆88Updated this week
- A curated list of VULNERABLE APPS and SYSTEMS which can be used as PENETRATION TESTING PRACTICE LAB.☆32Updated last year
- Living Off Security Tools☆41Updated 3 weeks ago
- Canary Detection☆162Updated 7 months ago
- Dredging up secrets from the depths of the file system☆115Updated 2 weeks ago
- A Golang package for scanning private and public IPs for open TCP ports 👁️☆102Updated 6 months ago
- Build a C2 system while becoming a techie Gh0stbust3r! Learn real-world RedTeam skills and even earn a basic c2 by completing the game☆3Updated last year
- A cybersecurity tool designed to safeguard against IDN Homograph Attacks☆33Updated this week
- Read Chromium data (namely, cookies and local storage) straight from disk, without spinning up the browser.☆111Updated 3 months ago
- OSINT tool that finds domains, subdomains, directories, endpoints and files for a given seed URL.☆169Updated 7 months ago
- Daily updates from leaked data search engines and aggregators☆86Updated this week