Bluetooth DOS Attack Script for Educational Purposes. Used in School Project
☆168Jan 7, 2022Updated 4 years ago
Alternatives and similar repositories for Bluetooth-DOS-Attack
Users that are interested in Bluetooth-DOS-Attack are comparing it to the libraries listed below
Sorting:
- Clipboard poisoning attack.☆58Jun 22, 2020Updated 5 years ago
- Social Media Search Tool☆15Aug 25, 2024Updated last year
- (Hacking-Tool), All tools in one!☆13Jul 5, 2021Updated 4 years ago
- ☆30May 29, 2025Updated 9 months ago
- This script was developped to assist in SpearPhishing campaign during Red Team operations. It can be used to generate random name based o…☆13Feb 6, 2023Updated 3 years ago
- ☆65Apr 28, 2024Updated last year
- Simple Android spyware that uploads all files from user selected paths.☆24Jan 13, 2025Updated last year
- Bluebugger☆31Jun 19, 2025Updated 9 months ago
- Python program Fileless-PE.py generates a Python script (PEloader.py) to load a DLL or EXE file from a given URL. It provides functionali…☆30Jul 17, 2024Updated last year
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆190Jul 30, 2024Updated last year
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆58May 31, 2024Updated last year
- PacketSpy☆156May 31, 2024Updated last year
- ☆14Feb 21, 2025Updated last year
- Black-Tool-For-Windows☆15Sep 8, 2021Updated 4 years ago
- A comprehensive WiFi penetration testing framework for security professionals☆16Jul 18, 2025Updated 8 months ago
- tool used to change your IP every second your want☆444Jul 5, 2024Updated last year
- rang3r | Multi Thread IP + Port Scanner☆128Oct 28, 2023Updated 2 years ago
- raTrix is a powerful Android administration tool designed for Linux systems. It utilizes Python on the client-side and Java on the server…☆21Dec 28, 2024Updated last year
- This is a basic script that you can use to do a Denial-of-service attack.☆20Mar 22, 2021Updated 5 years ago
- ☆149Jun 17, 2024Updated last year
- Impacket is a collection of Python classes for working with network protocols.☆12Nov 11, 2023Updated 2 years ago
- This script automates the process of unlocking Apple ID accounts by solving captcha challenges, verifying account details, and resetting …☆14Jan 24, 2026Updated last month
- proxychains is a tool that forces any TCP connection made by any given application to follow through proxy like TOR or any other SOCKS4, …☆34Sep 19, 2023Updated 2 years ago
- Python scripts and tools built during my learning journey☆31Nov 14, 2025Updated 4 months ago
- DDoS Tool using Multi-tor and Torshammer tool☆65Apr 18, 2021Updated 4 years ago
- Redirect All Traffic Through Tor Network For Kali Linux☆221Mar 26, 2025Updated 11 months ago
- bugreport☆13May 19, 2019Updated 6 years ago
- A curated list of GPT agents for cybersecurity☆21Feb 2, 2024Updated 2 years ago
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆15May 15, 2024Updated last year
- This Is A Python Script That Forwards SMS Messages To A Discord Webhook☆10Feb 22, 2024Updated 2 years ago
- An Android RAT creator toolkit.☆28Jun 19, 2025Updated 9 months ago
- GitHub CVE Repository Hunt☆18Jul 23, 2024Updated last year
- A Burp Suite extension that helps track and manage multiple sessions simultaneously by color-coding HTTP requests based on custom pattern…☆27Nov 21, 2024Updated last year
- mapAccountHijack is a tool designed to carry out a MAP Account hijack attack, which exploits the Message Access Profile (MAP) in Bluetoot…☆72Feb 1, 2025Updated last year
- Advance DDOS attack detector tool written completely on Python3☆28Jun 11, 2022Updated 3 years ago
- Privilege Escalation using Passwd - April Fools prank☆37Apr 3, 2025Updated 11 months ago
- Repository contains a collection of scripts designed to demonstrate and exploit various vulnerabilities in HTTP and related protocols☆30Nov 24, 2025Updated 3 months ago
- ادات جلب معلوماتUSES SpiderFoot can be used offensively (e.g. in a red team exercise or penetration test) for reconnaissance of your targ…☆28Feb 3, 2021Updated 5 years ago
- The script uses an Google maps API to download photos of places in the area specified by coordinates and search radius☆19Oct 16, 2023Updated 2 years ago