Mauddib28 / bleep-toolLinks
Bluetooth Landscape Exploration & Enumeration Platform
☆52Updated last week
Alternatives and similar repositories for bleep-tool
Users that are interested in bleep-tool are comparing it to the libraries listed below
Sorting:
- A reconnaissance tool for capturing and displaying SSIDs from device's Preferred Network List.☆165Updated this week
- Web Server Vulnerability Scanning Tool☆36Updated 9 months ago
- Static code analyser for backdoors and malicious code in git repos using OpenAI compatible LLM APIs☆73Updated last year
- PWN is an open security automation framework that aims to stand on the shoulders of security giants, promoting trust and innovation.☆67Updated 2 weeks ago
- 🌑 EclipseRecon is a personal project developed during my cybersecurity learning journey 🛡️. It helps practice web reconnaissance 🌐 by …☆28Updated last month
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.☆74Updated 4 months ago
- Modular web-application honeypot platform built using go and gin☆63Updated last year
- Bluetooth Security Assessment Methodology☆147Updated last year
- a hackbot proof-of-concept☆40Updated last year
- one-stop resource for all things offensive security.☆174Updated this week
- 📡 802.11 broadcast analyzer & injector☆162Updated 6 months ago
- A Powerful Network Reconnaissance Tool for Security Professionals☆106Updated last year
- Modern honeypot supporting multiple services, realistic website cloning, and AI-powered features☆154Updated last month
- Analyze pcaps with Zeek and a Grafana Dashboard☆188Updated last year
- A fast, customizable service detection tool powered by a flexible fingerprint system. It helps you identify services, APIs, and network c…☆41Updated last week
- Red Kite, the Extensible Attack Surface Management tool.☆90Updated 2 weeks ago
- EZGHSA is a command-line tool for summarizing and filtering vulnerability alerts on Github repositories.☆35Updated this week
- Security tool against dependency typosquatting attacks☆54Updated this week
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆107Updated 7 months ago
- ☆13Updated 2 years ago
- Post-Quantum Cryptography Scanner - Scan SSH/TLS servers for PQC support☆102Updated 2 months ago
- Customized CVE FEED Notifier☆114Updated 8 months ago
- Offline Cybersecurity Knowledge Base☆197Updated last week
- An uber fast and simple subdomain enumeration tool using DNS and web requests with support for detecting wildcard DNS records.☆173Updated last year
- Knowledge base on cybercriminal concealment techniques☆91Updated 8 months ago
- Identify hardcoded secrets in static structured text (version 2)☆96Updated 11 months ago
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆99Updated 5 months ago
- The MSAK is a tool written in Python to help discovering and testing exposed standard and custom services of ModBus Servers/Slaves over S…☆20Updated last year
- A cybersecurity tool designed to safeguard against IDN Homograph Attacks☆45Updated 5 months ago
- Deep Linux runtime visibility meets Wireshark☆299Updated last month