PoC to record audio from a Bluetooth device
☆1,565Apr 4, 2024Updated last year
Alternatives and similar repositories for BlueSpy
Users that are interested in BlueSpy are comparing it to the libraries listed below
Sorting:
- BlueToolkit is an extensible Bluetooth Classic vulnerability testing framework that helps uncover new and old vulnerabilities in Bluetoo…☆655Aug 29, 2025Updated 6 months ago
- 🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard…☆1,781Feb 11, 2026Updated 2 weeks ago
- Bluetooth Security Assessment Methodology☆149Jan 8, 2026Updated last month
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.☆1,302Updated this week
- smbclient-ng, a fast and user friendly way to interact with SMB shares.☆1,019Feb 1, 2026Updated last month
- ☆727Jun 24, 2024Updated last year
- ☆568Mar 28, 2024Updated last year
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆374Apr 6, 2024Updated last year
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆814Mar 28, 2025Updated 11 months ago
- Dump cookies and credentials directly from Chrome/Edge process memory☆1,408Jan 19, 2026Updated last month
- A tool that takes over Windows Updates to craft custom downgrades and expose past fixed vulnerabilities☆701Oct 26, 2024Updated last year
- Simulate the behavior of AV/EDR for malware development training.☆562Feb 15, 2024Updated 2 years ago
- This map lists the essential techniques to bypass anti-virus and EDR☆3,161Mar 28, 2025Updated 11 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆150May 3, 2024Updated last year
- A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.☆787Jan 9, 2025Updated last year
- The Network Execution Tool☆5,296Updated this week
- Wi-Fi Exploitation Framework☆2,766Sep 24, 2025Updated 5 months ago
- A sniffer for Bluetooth 5 and 4.x LE☆1,092Sep 25, 2025Updated 5 months ago
- Rust for malware Development is a repository for advanced Red Team techniques and offensive malwares & Ransomwares, focused on Rust 🦀☆3,311Feb 17, 2026Updated 2 weeks ago
- Open-source security research tool for identifying origin IP exposure of websites protected by Cloudflare and similar reverse proxy servi…☆2,104Jan 6, 2026Updated last month
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,156Updated this week
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆637May 8, 2025Updated 9 months ago
- Keylogging server and client that uses DNS tunneling/exfiltration to transmit keystrokes through firewalls.☆275Jun 16, 2024Updated last year
- jshunter is a command-line tool designed for analyzing JavaScript files and extracting endpoints. This tool specializes in identifying se…☆489Jan 22, 2026Updated last month
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆1,314Nov 12, 2025Updated 3 months ago
- PoC for a SMS-based shell. Send commands and receive responses over SMS from mobile broadband capable computers☆369May 22, 2023Updated 2 years ago
- OSINT tool to crawl a site and extract useful recon info.☆459Aug 13, 2025Updated 6 months ago
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆2,188Jan 5, 2026Updated last month
- Network Security Sniffer☆840Jan 2, 2026Updated 2 months ago
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,821Nov 3, 2024Updated last year
- MITM Field Manual☆369Jan 9, 2026Updated last month
- exploits for CVE-2024-20017☆140Sep 7, 2024Updated last year
- All-in-One Toolkit for BruteForce Attacks☆1,078Sep 28, 2024Updated last year
- Complete list of LPE exploits for Windows (starting from 2023)☆911Feb 20, 2026Updated last week
- CIA UAC bypass implementation of Stinger that obtains the token from an auto-elevated process, modifies it, and reuses it to execute as A…☆301Feb 2, 2026Updated last month
- Azure DevOps Services Attack Toolkit☆150Mar 15, 2025Updated 11 months ago
- EDR Lab for Experimentation Purposes☆1,413Updated this week
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆388Jan 20, 2026Updated last month
- Tunnel TCP connections through a file☆1,043Nov 21, 2025Updated 3 months ago