PoC to record audio from a Bluetooth device
β1,577Apr 4, 2024Updated 2 years ago
Alternatives and similar repositories for BlueSpy
Users that are interested in BlueSpy are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- π¨ CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) π Unauthenticated Peering Leading to Code Execution (Using HID Keyboardβ¦β1,817Feb 11, 2026Updated 2 months ago
- BlueToolkit is an extensible Bluetooth Classic vulnerability testing framework that helps uncover new and old vulnerabilities in Bluetooβ¦β677Mar 5, 2026Updated last month
- Bluetooth Security Assessment Methodologyβ154Mar 31, 2026Updated last week
- β731Jun 24, 2024Updated last year
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Powerβ¦β818Mar 28, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.β1,326Updated this week
- smbclient-ng, a fast and user friendly way to interact with SMB shares.β1,027Feb 1, 2026Updated 2 months ago
- β570Mar 28, 2024Updated 2 years ago
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offerβ¦β373Apr 6, 2024Updated 2 years ago
- Dump cookies and credentials directly from Chrome/Edge process memoryβ1,430Updated this week
- This map lists the essential techniques to bypass anti-virus and EDRβ3,183Mar 28, 2025Updated last year
- Simulate the behavior of AV/EDR for malware development training.β565Feb 15, 2024Updated 2 years ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printingβ152May 3, 2024Updated last year
- A sniffer for Bluetooth 5 and 4.x LEβ1,106Sep 25, 2025Updated 6 months ago
- Virtual machines for every use case on DigitalOcean β’ AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Wi-Fi Exploitation Frameworkβ2,773Sep 24, 2025Updated 6 months ago
- A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.β790Jan 9, 2025Updated last year
- A tool that takes over Windows Updates to craft custom downgrades and expose past fixed vulnerabilitiesβ708Oct 26, 2024Updated last year
- Rust for malware Development is a repository for advanced Red Team techniques and offensive malwares & Ransomwares, focused on Rust π¦β3,375Mar 4, 2026Updated last month
- The Network Execution Toolβ5,407Updated this week
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.β395Jan 20, 2026Updated 2 months ago
- Keylogging server and client that uses DNS tunneling/exfiltration to transmit keystrokes through firewalls.β276Jun 16, 2024Updated last year
- linWinPwn is a bash script that streamlines the use of a number of Active Directory toolsβ2,161Mar 8, 2026Updated last month
- MITM Field Manualβ373Jan 9, 2026Updated 3 months ago
- GPU virtual machines on DigitalOcean Gradient AI β’ AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inteβ¦β1,347Nov 12, 2025Updated 5 months ago
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Frameworkβ639May 8, 2025Updated 11 months ago
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the β¦β1,844Nov 3, 2024Updated last year
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.β2,221Jan 5, 2026Updated 3 months ago
- Local & remote Windows DLL Proxyingβ174Jun 17, 2024Updated last year
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is aβ¦β192Jul 30, 2024Updated last year
- Open-source security research tool for identifying origin IP exposure of websites protected by Cloudflare and similar reverse proxy serviβ¦β2,126Jan 6, 2026Updated 3 months ago
- jshunter is a command-line tool designed for analyzing JavaScript files and extracting endpoints. This tool specializes in identifying seβ¦β503Jan 22, 2026Updated 2 months ago
- LEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and eβ¦β379Dec 5, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient β’ AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Tunnel TCP connections through a fileβ1,047Updated this week
- The Havoc Frameworkβ8,266Dec 18, 2025Updated 3 months ago
- OSINT tool to crawl a site and extract useful recon info.β460Aug 13, 2025Updated 7 months ago
- exploits for CVE-2024-20017β140Sep 7, 2024Updated last year
- Android security insights in full spectrum.β957Jul 26, 2025Updated 8 months ago
- All-in-One Toolkit for BruteForce Attacksβ1,114Sep 28, 2024Updated last year
- Network Security Snifferβ851Jan 2, 2026Updated 3 months ago