PoC to record audio from a Bluetooth device
☆1,582Apr 24, 2026Updated 3 weeks ago
Alternatives and similar repositories for BlueSpy
Users that are interested in BlueSpy are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard…☆1,826Feb 11, 2026Updated 3 months ago
- BlueToolkit is an extensible Bluetooth Classic vulnerability testing framework that helps uncover new and old vulnerabilities in Bluetoo…☆694Mar 5, 2026Updated 2 months ago
- Bluetooth Security Assessment Methodology☆156Mar 31, 2026Updated last month
- ☆727Jun 24, 2024Updated last year
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆817Mar 28, 2025Updated last year
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.☆1,353Updated this week
- smbclient-ng, a fast and user friendly way to interact with SMB shares.☆1,032Apr 17, 2026Updated last month
- ☆571Mar 28, 2024Updated 2 years ago
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆375Apr 6, 2024Updated 2 years ago
- Dump cookies and credentials directly from Chrome/Edge process memory☆1,459Apr 9, 2026Updated last month
- This map lists the essential techniques to bypass anti-virus and EDR☆3,261Mar 28, 2025Updated last year
- Simulate the behavior of AV/EDR for malware development training.☆567Feb 15, 2024Updated 2 years ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆153May 3, 2024Updated 2 years ago
- A sniffer for Bluetooth 5 and 4.x LE☆1,120Sep 25, 2025Updated 7 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.☆794Jan 9, 2025Updated last year
- Wi-Fi Exploitation Framework☆2,906Sep 24, 2025Updated 7 months ago
- A tool that takes over Windows Updates to craft custom downgrades and expose past fixed vulnerabilities☆712Oct 26, 2024Updated last year
- The Network Execution Tool☆5,517May 12, 2026Updated last week
- Rust for malware Development is a repository for advanced Red Team techniques and offensive malwares & Ransomwares, focused on Rust 🦀☆3,510May 5, 2026Updated 2 weeks ago
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆398Jan 20, 2026Updated 4 months ago
- Keylogging server and client that uses DNS tunneling/exfiltration to transmit keystrokes through firewalls.☆276Jun 16, 2024Updated last year
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,176May 14, 2026Updated last week
- An ADCS honeypot to catch attackers in your internal network.☆328Jun 27, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- MITM Field Manual☆387Jan 9, 2026Updated 4 months ago
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆644May 8, 2025Updated last year
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,859Nov 3, 2024Updated last year
- A self-hosted sandbox for red teams to test payloads against modern detection before deployment. MCP integration lets an LLM agent drive …☆1,426May 5, 2026Updated 2 weeks ago
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆2,252Apr 24, 2026Updated 3 weeks ago
- Local & remote Windows DLL Proxying☆174Jun 17, 2024Updated last year
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆191Jul 30, 2024Updated last year
- jshunter is a command-line tool designed for analyzing JavaScript files and extracting endpoints. This tool specializes in identifying se…☆515May 16, 2026Updated last week
- Open-source security research tool for identifying origin IP exposure of websites protected by Cloudflare and similar reverse proxy servi…☆2,145Jan 6, 2026Updated 4 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- LEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and e…☆379Dec 5, 2023Updated 2 years ago
- Tunnel TCP connections through a file☆1,052Apr 10, 2026Updated last month
- The Havoc Framework☆8,361Dec 18, 2025Updated 5 months ago
- OSINT tool to crawl a site and extract useful recon info.☆461Aug 13, 2025Updated 9 months ago
- exploits for CVE-2024-20017☆140Sep 7, 2024Updated last year
- Android security insights in full spectrum.☆957May 16, 2026Updated last week
- All-in-One Toolkit for BruteForce Attacks☆1,130Sep 28, 2024Updated last year