TarlogicSecurity / BlueSpyLinks
PoC to record audio from a Bluetooth device
β1,357Updated last year
Alternatives and similar repositories for BlueSpy
Users that are interested in BlueSpy are comparing it to the libraries listed below
Sorting:
- π¨ CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) π Unauthenticated Peering Leading to Code Execution (Using HID Keyboardβ¦β1,565Updated 2 months ago
- β697Updated last year
- BlueToolkit is an extensible Bluetooth Classic vulnerability testing framework that helps uncover new and old vulnerabilities in Bluetooβ¦β476Updated 3 weeks ago
- WiFi Penetration Testing & Auditing Toolβ527Updated 2 months ago
- USB Army Knife β the ultimate close access tool for penetration testers and red teamers.β1,699Updated last week
- RockYou2024 10 billion passwords leaked in the largest compilation of all timeβ321Updated 11 months ago
- All-in-One Toolkit for BruteForce Attacksβ815Updated 9 months ago
- Magnet Link for Downloadingβ271Updated last year
- Bluetooth Forward and Future Secrecy Attacks and Defenses (BLUFFS) [CVE 2023-24023]β511Updated last year
- AutoPWN Suite is a project for scanning vulnerabilities and exploiting systems automatically.β997Updated 11 months ago
- Phishing with a fake reCAPTCHAβ575Updated 10 months ago
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.β1,142Updated 2 months ago
- Simple Windows and Linux keystroke injection tool that exfiltrates stored WiFi data (SSID and password).β434Updated last year
- 802.11 Attack Toolβ1,503Updated this week
- Chiasmodon is an OSINT tool designed to assist in the process of gathering information about a target domain. Its primary functionality β¦β616Updated 2 months ago
- Find, analyze, and check for exposed IP cameras with open ports, known vulnerabilities, and weak login credentials.β321Updated 2 months ago
- Generates millions of keyword-based password mutations in seconds.β1,332Updated last month
- Search WiFi geolocation data by BSSID and SSID on different public databases.β1,056Updated 6 months ago
- A deauth attack that disconnects all devices from the target wifi network (2.4Ghz & 5Ghz)β618Updated 3 months ago
- π An OSINT tool for discovering linked social accounts and associated emails across multiple platforms using a single username.β778Updated 4 months ago
- Matkap - hunt down malicious Telegram botsβ661Updated 3 months ago
- AI-powered penetration testing assistant for automating recon, note-taking, and vulnerability analysis.β653Updated 2 months ago
- Port WiFi Pineapple NANO/TETRA in generic hardwareβ870Updated 2 months ago
- Autonomous Privilege Escalation using AIβ802Updated 3 months ago
- DetectDee: Hunt down social media accounts by username, email or phone across social networks.β1,513Updated last year
- Wi-Fi Exploitation Frameworkβ2,566Updated last month
- Zehef is an osint tool to track emailsβ830Updated 8 months ago
- secator - the pentester's swiss knifeβ1,119Updated 3 weeks ago
- Network Security Snifferβ802Updated 2 weeks ago
- The useful exploit finderβ814Updated last year