andrewmichaelsmith / bluepotView external linksLinks
Bluetooth Honeypot
☆265Jan 2, 2021Updated 5 years ago
Alternatives and similar repositories for bluepot
Users that are interested in bluepot are comparing it to the libraries listed below
Sorting:
- Fake-AP to perform Evil Twin Attack☆143Jul 29, 2018Updated 7 years ago
- Fast SSH Scan and BruteForcer for most common credentials.☆96Jun 15, 2018Updated 7 years ago
- WiFi Cracking Tool (Using Evil Twin Attack) With Some Modification. (Only For Legal Purposes)☆278May 13, 2018Updated 7 years ago
- Tool to check if an app is installed on the target device through a link☆123Mar 13, 2020Updated 5 years ago
- Multiplatform payload dropper☆281Aug 17, 2021Updated 4 years ago
- Inject malicious code into *.debs☆283Apr 26, 2022Updated 3 years ago
- Detect and prevent KRACK attacks in your network☆183Oct 20, 2017Updated 8 years ago
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆567May 3, 2024Updated last year
- This tool allows you to perform OSINT and reconnaissance on an organisation or an individual. It allows one to search 1.4 Billion clear t…☆520Dec 13, 2018Updated 7 years ago
- DBC2 (DropboxC2) is a modular post-exploitation tool, composed of an agent running on the victim's machine, a controler, running on any m…☆304Oct 27, 2017Updated 8 years ago
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,035May 27, 2020Updated 5 years ago
- Wordlist creator written in C to generate all possibilities of passwords☆91Jun 16, 2018Updated 7 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆373Apr 27, 2023Updated 2 years ago
- Detect evil urls that uses IDN Homograph Attack.☆207Jan 24, 2018Updated 8 years ago
- Cromos is a tool for downloading legitimate extensions of the Chrome Web Store and inject codes in the background of the application.☆125Dec 13, 2017Updated 8 years ago
- Powerful framework for rogue access point attack.☆2,377Jan 9, 2024Updated 2 years ago
- Shodanwave is a tool for exploring and obtaining information from Netwave IP Camera.☆262Nov 15, 2020Updated 5 years ago
- Script that generates an Android App to hack SMS through WAN☆390Jan 15, 2025Updated last year
- A tool to help you manage your leaks☆34Nov 22, 2017Updated 8 years ago
- Generate unicode domains for IDN Homograph Attack and detect them.☆1,245Apr 26, 2022Updated 3 years ago
- 📡 🍍Detects activities of PineAP module and starts deauthentication attack (for fake access points - WiFi Pineapple Activities Detection…☆239Jun 8, 2020Updated 5 years ago
- Reconnaissance Swiss Army Knife☆2,005Jan 26, 2021Updated 5 years ago
- Hijack services that relies on QR Code Authentication.☆270Dec 20, 2023Updated 2 years ago
- A highly configurable Linux Bluetooth scanner with optional web interface.☆131Jul 16, 2019Updated 6 years ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆153Oct 20, 2018Updated 7 years ago
- Efficient and advanced man in the middle framework☆2,162Mar 23, 2023Updated 2 years ago
- Human and machine readable web vulnerability testing format☆195Sep 19, 2022Updated 3 years ago
- Web hacking framework with tools, exploits by python☆392Dec 8, 2022Updated 3 years ago
- Chrome Keylogger Extension | Post Exploitation Tool☆438Apr 26, 2022Updated 3 years ago
- FireShodanMap is a Realtime map that integrates Firebase, Google Maps and Shodan. A search is carried out using Shodan searching vulnerab…☆126May 25, 2018Updated 7 years ago
- Lima Installer was a web based Cydia alternative which was based around a central server system☆10Mar 23, 2024Updated last year
- Template for asynchronously controlling meterpreter sessions☆13Jun 19, 2018Updated 7 years ago
- Intelligent login bruteforcer.☆906Apr 27, 2023Updated 2 years ago
- A WebDAV PROPFIND C2 tool☆119Aug 27, 2019Updated 6 years ago
- A low to medium interaction honeypot.☆473Mar 21, 2024Updated last year
- ☆282Dec 5, 2017Updated 8 years ago
- A set of scripts for a radare-based malware code analysis workflow☆68Jan 10, 2019Updated 7 years ago
- A WebSocket C2 Tool☆410Nov 24, 2017Updated 8 years ago