TarlogicSecurity / BlueSpy
PoC to record audio from a Bluetooth device
β1,065Updated 11 months ago
Alternatives and similar repositories for BlueSpy:
Users that are interested in BlueSpy are comparing it to the libraries listed below
- π¨ CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) π Unauthenticated Peering Leading to Code Execution (Using HID Keyboardβ¦β1,479Updated 7 months ago
- β680Updated 9 months ago
- BlueToolkit is an extensible Bluetooth Classic vulnerability testing framework that helps uncover new and old vulnerabilities in Bluetooβ¦β399Updated last month
- Simple Windows and Linux keystroke injection tool that exfiltrates stored WiFi data (SSID and password).β411Updated last year
- WiFi Penetration Testing & Auditing Toolβ490Updated last month
- Network Security Snifferβ772Updated last week
- 802.11 Attack Toolβ1,389Updated this week
- Chiasmodon is an OSINT tool designed to assist in the process of gathering information about a target domain. Its primary functionality β¦β558Updated 6 months ago
- All-in-One Toolkit for BruteForce Attacksβ663Updated 5 months ago
- A simple and easy way to find Flipper Zero Devices and Bluetooth Low Energy Based Attacksβ904Updated 3 weeks ago
- Phishing with a fake reCAPTCHAβ509Updated 6 months ago
- Nmap Dashboard Mini Projectβ575Updated 9 months ago
- Search WiFi geolocation data by BSSID and SSID on different public databases.β998Updated 3 months ago
- Red Team Toolkit - A curated list of tools that are commonly used in the field for Physical Security, Red Teaming, and Tactical Covert Enβ¦β498Updated 9 months ago
- A WiFi security auditing software mainly based on aircrack-ng tools suiteβ277Updated 3 months ago
- USB Army Knife β the ultimate close access tool for penetration testers and red teamers.β1,356Updated last week
- Generates millions of keyword-based password mutations in seconds.β1,269Updated 7 months ago
- Make BASH stealthy and hacker friendly with lots of bash functionsβ241Updated this week
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.β1,053Updated 2 weeks ago
- A tool to crack WPA2 passphrase with PMKID value without clients or de-authenticationβ210Updated last year
- "Bob the Smuggler": A tool that leverages HTML Smuggling Attack and allows you to create HTML files with embedded 7z/zip archives. The toβ¦β532Updated 2 weeks ago
- A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.β733Updated 2 months ago
- poc for CVE-2024-38063 (RCE in tcpip.sys)β654Updated 6 months ago
- A multiprotocol credentials bruteforcer / password sprayer and enumerator. π₯·β1,566Updated 3 weeks ago
- For educational purposes only, exhaustive samples of 450+ classic/modern trojan builders including screenshots.β703Updated last week
- Keylogging server and client that uses DNS tunneling/exfiltration to transmit keystrokes through firewalls.β272Updated 9 months ago
- A deauth attack that disconnects all devices from the target wifi network (2.4Ghz & 5Ghz)β517Updated this week
- Drone Hacking Tool is a GUI tool that works with a USB Wifi adapter and HackRF One for hacking drones.β536Updated 2 years ago
- Network brute force tool, written in Python. Faster than other existing solutions (including the main leader in the network brute force mβ¦β383Updated 3 years ago
- Hardware/IOT Pentesting Wikiβ579Updated last week