PoC to record audio from a Bluetooth device
β1,573Apr 4, 2024Updated last year
Alternatives and similar repositories for BlueSpy
Users that are interested in BlueSpy are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- π¨ CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) π Unauthenticated Peering Leading to Code Execution (Using HID Keyboardβ¦β1,806Feb 11, 2026Updated last month
- BlueToolkit is an extensible Bluetooth Classic vulnerability testing framework that helps uncover new and old vulnerabilities in Bluetooβ¦β667Mar 5, 2026Updated 2 weeks ago
- Bluetooth Security Assessment Methodologyβ151Jan 8, 2026Updated 2 months ago
- β730Jun 24, 2024Updated last year
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Powerβ¦β817Mar 28, 2025Updated 11 months ago
- smbclient-ng, a fast and user friendly way to interact with SMB shares.β1,024Feb 1, 2026Updated last month
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.β1,315Updated this week
- β569Mar 28, 2024Updated last year
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offerβ¦β374Apr 6, 2024Updated last year
- Dump cookies and credentials directly from Chrome/Edge process memoryβ1,417Jan 19, 2026Updated 2 months ago
- This map lists the essential techniques to bypass anti-virus and EDRβ3,173Mar 28, 2025Updated 11 months ago
- Simulate the behavior of AV/EDR for malware development training.β565Feb 15, 2024Updated 2 years ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printingβ151May 3, 2024Updated last year
- A sniffer for Bluetooth 5 and 4.x LEβ1,101Sep 25, 2025Updated 5 months ago
- Wi-Fi Exploitation Frameworkβ2,772Sep 24, 2025Updated 5 months ago
- A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.β789Jan 9, 2025Updated last year
- Rust for malware Development is a repository for advanced Red Team techniques and offensive malwares & Ransomwares, focused on Rust π¦β3,342Mar 4, 2026Updated 2 weeks ago
- A tool that takes over Windows Updates to craft custom downgrades and expose past fixed vulnerabilitiesβ701Oct 26, 2024Updated last year
- The Network Execution Toolβ5,356Updated this week
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.β391Jan 20, 2026Updated 2 months ago
- Keylogging server and client that uses DNS tunneling/exfiltration to transmit keystrokes through firewalls.β276Jun 16, 2024Updated last year
- linWinPwn is a bash script that streamlines the use of a number of Active Directory toolsβ2,157Mar 8, 2026Updated 2 weeks ago
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inteβ¦β1,330Nov 12, 2025Updated 4 months ago
- MITM Field Manualβ372Jan 9, 2026Updated 2 months ago
- An ADCS honeypot to catch attackers in your internal network.β326Jun 27, 2024Updated last year
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Frameworkβ640May 8, 2025Updated 10 months ago
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the β¦β1,828Nov 3, 2024Updated last year
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.β2,209Jan 5, 2026Updated 2 months ago
- Local & remote Windows DLL Proxyingβ169Jun 17, 2024Updated last year
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is aβ¦β190Jul 30, 2024Updated last year
- Open-source security research tool for identifying origin IP exposure of websites protected by Cloudflare and similar reverse proxy serviβ¦β2,113Jan 6, 2026Updated 2 months ago
- jshunter is a command-line tool designed for analyzing JavaScript files and extracting endpoints. This tool specializes in identifying seβ¦β497Jan 22, 2026Updated 2 months ago
- LEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and eβ¦β377Dec 5, 2023Updated 2 years ago
- Tunnel TCP connections through a fileβ1,045Nov 21, 2025Updated 4 months ago
- The Havoc Frameworkβ8,245Dec 18, 2025Updated 3 months ago
- OSINT tool to crawl a site and extract useful recon info.β459Aug 13, 2025Updated 7 months ago
- exploits for CVE-2024-20017β140Sep 7, 2024Updated last year
- All-in-One Toolkit for BruteForce Attacksβ1,086Sep 28, 2024Updated last year
- Android security insights in full spectrum.β952Jul 26, 2025Updated 7 months ago