TarlogicSecurity / BlueSpyLinks
PoC to record audio from a Bluetooth device
β1,488Updated last year
Alternatives and similar repositories for BlueSpy
Users that are interested in BlueSpy are comparing it to the libraries listed below
Sorting:
- π¨ CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) π Unauthenticated Peering Leading to Code Execution (Using HID Keyboardβ¦β1,680Updated 5 months ago
- BlueToolkit is an extensible Bluetooth Classic vulnerability testing framework that helps uncover new and old vulnerabilities in Bluetooβ¦β592Updated 2 months ago
- WiFi Penetration Testing & Auditing Toolβ585Updated 6 months ago
- Find, analyze, and check for exposed IP cameras with open ports, known vulnerabilities, and weak login credentials.β639Updated 3 months ago
- Search WiFi geolocation data by BSSID and SSID on different public databases.β1,099Updated 10 months ago
- All-in-One Toolkit for BruteForce Attacksβ915Updated last year
- Simple Windows and Linux keystroke injection tool that exfiltrates stored WiFi data (SSID and password).β534Updated 3 months ago
- USB Army Knife β the ultimate close access tool for penetration testers and red teamers.β1,945Updated last month
- β711Updated last year
- RockYou2024 10 billion passwords leaked in the largest compilation of all timeβ344Updated last year
- Bluetooth Forward and Future Secrecy Attacks and Defenses (BLUFFS) [CVE 2023-24023]β517Updated last year
- Magnet Link for Downloadingβ288Updated last year
- Chiasmodon is an OSINT tool designed to assist in the process of gathering information about a target domain. Its primary functionality β¦β652Updated 5 months ago
- A deauth attack that disconnects all devices from the target wifi network (2.4Ghz & 5Ghz)β701Updated 7 months ago
- secator - the pentester's swiss knifeβ1,155Updated last week
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.β1,175Updated 2 weeks ago
- 802.11 Attack Toolβ1,684Updated this week
- DetectDee: Hunt down social media accounts by username, email or phone across social networks.β1,643Updated 2 years ago
- AI-powered penetration testing assistant for automating recon, note-taking, and vulnerability analysis.β733Updated 6 months ago
- Generates millions of keyword-based password mutations in seconds.β1,365Updated 4 months ago
- Matkap - hunt down malicious Telegram botsβ790Updated 2 months ago
- Wi-Fi Exploitation Frameworkβ2,614Updated last month
- Phishing with a fake reCAPTCHAβ619Updated last year
- Advanced LLM-powered brute-force tool combining AI intelligence with automated login attacksβ933Updated 2 weeks ago
- Open Source Intelligence Interface for Deep Web Scrapingβ1,358Updated last month
- Get IP address on other side audio call in Telegram.β1,813Updated 2 years ago
- π An OSINT tool for discovering linked social accounts and associated emails across multiple platforms using a single username.β873Updated 7 months ago
- An OSINT tool to quickly extract IP and URL endpoints from APKs by disassembling and decompilingβ782Updated last year
- Track the GPS location of the user's smartphone or PC and capture a picture of the target, along with IP and device information.β1,178Updated 7 months ago
- AutoPWN Suite is a project for scanning vulnerabilities and exploiting systems automatically.β1,024Updated last week