Neetx / BlueReverse
Bluetooth reverse shell.
☆16Updated 4 years ago
Alternatives and similar repositories for BlueReverse:
Users that are interested in BlueReverse are comparing it to the libraries listed below
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- Python script that acts like the original sudo binary to fool users into entering their passwords☆19Updated 8 years ago
- ☆13Updated 7 years ago
- MS17-010☆12Updated 7 years ago
- ☆15Updated 2 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆13Updated 10 years ago
- Automation Hacking & Penetration Testing Suite☆10Updated 8 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆18Updated 5 years ago
- AgentTesla botnet C&C RCE exploit.☆16Updated 5 years ago
- A full-fledged msfrpc library for Metasploit framework.☆8Updated 7 years ago
- Golang code to crawl website, extract links from html, paths from JavaScript code, follow and repeat.☆12Updated 6 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 5 years ago
- A tool to speed up Android pentesting by automating the APK acquisition and information gathering☆19Updated 2 years ago
- Proof of Concept for CVE-2018-11776☆21Updated 6 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆41Updated 7 years ago
- ☆20Updated 5 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆23Updated 7 years ago
- Hacking Wordlist collections for password cracking are attached in the below files☆16Updated 7 years ago
- a simple, barely functional, prototyping RAT (Remote Administration Tool)☆9Updated 7 years ago
- Basic tool to automate backdooring PE files☆54Updated 3 years ago
- A tool that can help detect and takeover subdomains with dead DNS records☆12Updated 6 years ago
- Software exploitation training material☆15Updated 7 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆51Updated 7 years ago
- yet another dirbuster☆19Updated 4 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 12 years ago
- A playground to practice SSRF Attacks against web apps☆17Updated 6 years ago
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆12Updated 6 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆12Updated 7 years ago
- XSS payload designed to steal LastPass users' credentials☆17Updated 10 years ago