Bluetooth reverse shell.
☆14Dec 16, 2020Updated 5 years ago
Alternatives and similar repositories for BlueReverse
Users that are interested in BlueReverse are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Tool for dictionary attack with fail2ban bypass.☆16Jan 8, 2022Updated 4 years ago
- Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass.☆12Aug 6, 2019Updated 6 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆53Mar 28, 2018Updated 8 years ago
- A tool for generating reverse shell payloads on the fly.☆10Jun 18, 2022Updated 3 years ago
- Modern Phishing Tool With Advanced Functionality [ Android-Support-Available ]☆31Oct 10, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ShockWave looks up for every connected device on the local network, then starts sending deauthentication packets to each of them. It is b…☆27Nov 19, 2019Updated 6 years ago
- decompiled pegasus_spyware☆14Jul 31, 2021Updated 4 years ago
- Image Payload Creating/Injecting tools☆13Jun 6, 2021Updated 4 years ago
- some small programs about network protocol, and some interesting tools☆14Jul 9, 2015Updated 10 years ago
- NSA's IIS 6.0 exploit that creates a remote backdoor.☆19Feb 12, 2019Updated 7 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆20Jul 4, 2020Updated 5 years ago
- Determine the Version Running on the Palo Alto Network Firewall for the Global Protect Portal☆13Aug 14, 2020Updated 5 years ago
- A toolkit to attack Office365☆16Aug 1, 2019Updated 6 years ago
- Metasploit Exploiting Tool For Linux☆21Sep 27, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆25Dec 14, 2021Updated 4 years ago
- androrat☆22Nov 6, 2019Updated 6 years ago
- This bash script tool, will perform advanced subdomain enumeration, save the results, it will then probe the subdomains into urls, save t…☆26Sep 6, 2024Updated last year
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆29Sep 13, 2018Updated 7 years ago
- Content for cyber defense course☆14Oct 15, 2014Updated 11 years ago
- Wordlists generated over the years of penetration testing☆14Mar 18, 2025Updated last year
- Plugins for the King Phisher open source phishing campaign toolkit.☆84Feb 21, 2021Updated 5 years ago
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- Python script to scan for weak CBC ciphers, weak MAC algorithms and support auth methods.☆17Apr 13, 2016Updated 9 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Web-based shell written in PHP☆12Aug 27, 2018Updated 7 years ago
- Popping boxes with Nmap☆18Apr 16, 2012Updated 13 years ago
- Full Auto Exploit tool to SQL Injection: Admin Find -dork generation and grab from cx-Security and proxy cheaker and more :)☆30Feb 22, 2018Updated 8 years ago
- Drivers for interfacing HackRF radios with REDHAWK☆11Jun 18, 2020Updated 5 years ago
- Burp Suite plugin identifies insertion points for GWT (Google Web Toolkit) requests☆13Sep 24, 2015Updated 10 years ago
- Porting BlueKeep PoC from @Ekultek to actual exploits☆11Jun 9, 2019Updated 6 years ago
- Fast exploitation based on metasploit.☆74Dec 28, 2019Updated 6 years ago
- Lightweight and extensible horizontal vulnerability scanner☆11Dec 8, 2022Updated 3 years ago
- CryptoTrojan in Python (For educational purpose ONLY)☆50Mar 23, 2018Updated 8 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33May 1, 2022Updated 3 years ago
- WordPress auto exploit☆29Dec 28, 2017Updated 8 years ago
- [Android] Samsung Knox Standard activation helper library for Android☆11Jun 14, 2019Updated 6 years ago
- Arp Spoof and inject beef hook in seconds☆13Feb 2, 2014Updated 12 years ago
- ☆10Apr 2, 2022Updated 4 years ago
- Modified drivers to reliably perform fragmentation and aggregation vulnerability tests☆12Jan 7, 2023Updated 3 years ago
- Automatically exported from code.google.com/p/auto-reaver☆13Mar 22, 2015Updated 11 years ago