TylerTucker / BluesCluesLinks
Discover Non-Discoverable Bluetooth Classic devices
☆11Updated 10 months ago
Alternatives and similar repositories for BluesClues
Users that are interested in BluesClues are comparing it to the libraries listed below
Sorting:
- Bluekit is an extensible engine, CLI tool used in BlueToolkit☆12Updated 2 months ago
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆16Updated last year
- Ansible build for Afl++ Frida-Mode☆25Updated last year
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆18Updated 2 years ago
- aiohttp LFI (CVE-2024-23334)☆27Updated last year
- ☆25Updated last year
- PoC code and tools for Black Hat USA 2024☆24Updated last year
- Exploit for CVE-2024-4885☆17Updated last year
- Lorex 2K Indoor Wi-Fi Security Camera: RCE Exploit Chain☆14Updated 9 months ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆52Updated last year
- The results of my small term paper on the topic of the Internet of Vulnerable Things and the exploit for CVE-2022-48194.☆16Updated 2 years ago
- 🎥 Spytruder: Advanced RTSP Camera Discovery and Vulnerability Assessment Tool☆18Updated last month
- Force target victim to unsafe network☆26Updated 2 months ago
- SpiralBL0CK / Remote-buffer-overflow-over-wifi_stack-in-wpa_supplicant-binary-in-android-11-platform-samsung-a20eRemote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Updated last year
- BlueStacks privilege escalation through VM backdooring☆21Updated last year
- Exfiltrate data over audio output from remote desktop sessions - Covert channel PoC☆62Updated 9 months ago
- ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer ove…☆87Updated last year
- BINARLY Research Tools and PoCs☆36Updated 11 months ago
- ☆19Updated 9 months ago
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆25Updated last year
- Lena's scripts/code/resources for malware analysis☆26Updated last year
- udpy_proto_scanner is a Python script which discovers UDP services by sending triggers to a list of hosts☆48Updated 2 years ago
- CVE-2024-23108: Fortinet FortiSIEM Unauthenticated 2nd Order Command Injection☆33Updated last year
- A download of code without integrity check vulnerability in the "execute restore src-vis" command of FortiOS before 7.0.3.☆21Updated last year
- Exploit Proof-of-Concept code for XAMPP v3.3.0 — '.ini' Buffer Overflow (Unicode + SEH)☆14Updated last year
- Use WordPress pingback.ping to transfer files.☆17Updated last year
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆21Updated last year
- A collection of statically-linked tools targeted to run on almost any linux system.☆31Updated 5 months ago
- details about DIAL protocol vulnerabilities☆30Updated last year
- Slides and videos from talks given at cons☆24Updated 2 months ago