Bluetooth Security Assessment Methodology
☆149Jan 8, 2026Updated last month
Alternatives and similar repositories for BSAM
Users that are interested in BSAM are comparing it to the libraries listed below
Sorting:
- bypassing the twitter safety link firewall :)☆12May 4, 2025Updated 9 months ago
- Directory with Bluetooth exploits that is used in BlueToolkit☆21Sep 30, 2025Updated 5 months ago
- PoC to record audio from a Bluetooth device☆1,565Apr 4, 2024Updated last year
- BlueToolkit is an extensible Bluetooth Classic vulnerability testing framework that helps uncover new and old vulnerabilities in Bluetoo…☆655Aug 29, 2025Updated 6 months ago
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"☆14Dec 8, 2023Updated 2 years ago
- Volatility 3 plugins to extract a module as complete as possible☆12Jun 13, 2023Updated 2 years ago
- Automatically fuzz Rust projects from scratch☆59Jul 8, 2025Updated 7 months ago
- AI Powered Sensitive Information Detection☆20Mar 13, 2024Updated last year
- Additional active scan checks for BURP☆28Oct 3, 2024Updated last year
- Extract registry and NTDS secrets from local or remote disk images☆45Mar 15, 2025Updated 11 months ago
- Bluekit is an extensible engine, CLI tool used in BlueToolkit☆17Sep 25, 2025Updated 5 months ago
- Excel Add In Payload Generator☆14Oct 9, 2023Updated 2 years ago
- Small toolkit for extracting information and dumping sensitive strings from Windows processes☆116Jul 17, 2024Updated last year
- details about DIAL protocol vulnerabilities☆29Nov 24, 2023Updated 2 years ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆19Aug 3, 2023Updated 2 years ago
- ☆65Mar 15, 2024Updated last year
- SpeedyTest☆17Jun 21, 2023Updated 2 years ago
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year
- PoC for dumping and decrypting cookies in the latest version of Microsoft Teams☆131Nov 12, 2023Updated 2 years ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Oct 9, 2024Updated last year
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts☆128Dec 23, 2025Updated 2 months ago
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Sep 18, 2024Updated last year
- ☆22Dec 30, 2025Updated 2 months ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Oct 12, 2024Updated last year
- ☆108Nov 7, 2024Updated last year
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆228Updated this week
- BTLEmap's Bluetooth Low Energy framework that powers the app