Offensive-Wireless / Bluetooth-Penetration-TestingLinks
Explore the realm of Bluetooth Penetration Testing through our comprehensive website. Learn about different techniques, tools, and best practices used to expose vulnerabilities and improve the security of Bluetooth technologies. Stay up-to-date with latest trends and advancements in the field of Bluetooth security testing.
☆25Updated last year
Alternatives and similar repositories for Bluetooth-Penetration-Testing
Users that are interested in Bluetooth-Penetration-Testing are comparing it to the libraries listed below
Sorting:
- Manual scripts to hack into cars :)☆108Updated 8 months ago
- This repository contains scripts in python from discovering bluetooth to taking over the bluetooth connections.☆163Updated last year
- A tool which perform deauthentication attack on unpaired bluetooth devices.☆46Updated 4 months ago
- Raspberry Pi Zero 2 W Kali Linux (Pi-Tail) installation and setup☆49Updated last year
- Emensta'sToolKit is a multifunctinal Kit with tools for checking, and doing several things with a network and it's devices. The tool will…☆51Updated last year
- Build repo from Universal Wifi pineapple hardware cloner☆82Updated 2 years ago
- Incident Response (IR) tool to create a list of USB-Rubber-Ducky instructions.☆52Updated 6 years ago
- WiFi Password Evil Portal modified to work on the Wi-Fi Pineapple MK7☆36Updated 4 years ago
- Make your own rubber ducky USB with VBScript and execute any commands you want!☆43Updated 7 months ago
- A bluetooth control script for all your Bluetooth devices DoS needs.☆100Updated last year
- This script allows you to create a hidden admin account on your victim's PC.☆42Updated 10 months ago
- This program show you IMSI numbers of cellphones around you.☆12Updated 5 years ago
- A modular Python bot that integrates with Discord☆50Updated 2 years ago
- BTSM (Behind-the-Scenes Manipulation) Payloads PoC☆29Updated last year
- Script to create custom Evil Portals using the Wifi Pineapple 🍍😈☆13Updated 2 years ago
- Cibersecurity blog. CTFs, writeups, electronics and more!☆49Updated last month
- This project showcases how to exploit vulnerabilities in NFC cards using Arduino and RFID technology. By leveraging the MFRC522 RFID modu…☆15Updated 2 years ago
- A super fast number dictionary generator (2M+ lines per second) to aid numeric dictionary-based attacks. This project uses multiprocessin…☆27Updated 4 years ago
- PiZ0mn1aTool is a compact and powerful hacking tool, crafted around the Raspberry Pi Zero 2W, paired with a Display Gaming LCD Hat.☆26Updated 2 years ago
- A collection of Encoded Payloads from the Community both for Hak5 & BadUSB Devices☆72Updated last year
- ☆137Updated last year
- Pentesting Suite☆55Updated 5 months ago
- Bypassing Rolling Code Systems☆43Updated 6 years ago
- Playground (and dump) of stuff I make or modify for the Flipper Zero☆38Updated 2 years ago
- 🔑This is a small project about an RF module for an Arduino. This module can transmit at 433 MHz, which can be used to jam or disable a c…☆55Updated 2 years ago
- This Script will produce all of the WPA2 Passwords used by various Router companies aswell as Fritzbox. All of these Passwords will be 16…☆79Updated 2 years ago
- This project is a server-side solution for seamless URL redirection when a QR code is scanned. It redirects users to a specified URL and …☆14Updated last year
- Deauther Project can be used to: Disconnect Devices from Networks, and Clone Networks☆36Updated 3 years ago
- Browser streaming MITM proxy☆29Updated 2 years ago
- RollJam is a method of capturing a vehicle's rolling code key fob transmission by simultaneously intercepting the transmission and jammin…☆174Updated 3 years ago