TarlogicSecurity / BSAM
Bluetooth Security Assessment Methodology
☆112Updated 8 months ago
Alternatives and similar repositories for BSAM:
Users that are interested in BSAM are comparing it to the libraries listed below
- ☆123Updated last year
- Wireless Hacking Devices Protocol client☆143Updated this week
- QRFuzz, a fuzzing toolkit to test malicious QR Codes in mobile applications☆45Updated 8 months ago
- Slip is a CLI tool to create malicious archive files containing path traversal payloads. It supports zip, tar, 7z, jar, war, apk and ipa …☆91Updated 9 months ago
- The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility t…☆93Updated 4 months ago
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆88Updated 11 months ago
- ☆56Updated 5 years ago
- A public, open source physical security methodology☆44Updated 9 months ago
- ☆115Updated last year
- Apple BLE proximity pairing message spoofing☆19Updated last year
- Check subdomains for subdomain takeovers and other DNS tomfoolery☆115Updated last week
- A python3 script searching for secret on swaggerhub☆60Updated 2 years ago
- Deluder is a tool for intercepting traffic of proxy unaware applications. Currently, Deluder supports OpenSSL, GnuTLS, SChannel, WinSock …☆181Updated 3 months ago
- HardeningMeter is an open-source Python tool carefully designed to comprehensively assess the security hardening of binaries and systems.☆59Updated 2 months ago
- udpy_proto_scanner is a Python script which discovers UDP services by sending triggers to a list of hosts☆46Updated last year
- Hardware Hacking Cheatsheet infograph☆148Updated 11 months ago
- Certainly is a offensive security toolkit to capture large amounts of traffic in various network protocols in bitflip and typosquat scena…☆154Updated 4 months ago
- Moxie scans & tests MQTT services. Secure your IoT infrastructure!☆34Updated 7 months ago
- FlowMate, a BurpSuite extension that brings taint analysis to web applications, by tracking all parameters send to a target application a…☆157Updated 2 months ago
- CSPTPlayground is an open-source playground to find and exploit Client-Side Path Traversal (CSPT).☆102Updated 3 weeks ago
- Postman OSINT tool to extract creds, token, username, email & more from Postman Public Workspaces☆155Updated 7 months ago
- CVE-2024-6387 (regreSSHion) Exploit (PoC), a vulnerability in OpenSSH's server (sshd) on glibc-based Linux systems.☆37Updated 6 months ago
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆88Updated 9 months ago
- Pentest/Red Team: Resources, repos and scripts.☆65Updated this week
- ☆73Updated 6 months ago
- Filters and highlights Proxy HTTP history for requests with potentially vulnerable parameters☆23Updated last year
- A Slack bot phishing framework for Red Teaming exercises☆164Updated 9 months ago
- An intentionally vulnerable Android Application to demonstrate various vulnerabilities that airses in Android Components.☆23Updated 7 months ago
- Mining URLs from Wayback Machine for bug hunting/fuzzing/further probing☆56Updated last year
- CeWLeR - Custom Word List generator Redefined. CeWL alternative in Python, based on the Scrapy framework.☆96Updated 6 months ago