andrewmichaelsmith / bluepotLinks
Bluetooth Honeypot
☆262Updated 5 years ago
Alternatives and similar repositories for bluepot
Users that are interested in bluepot are comparing it to the libraries listed below
Sorting:
- An automated Wireless RogueAP MITM attack framework.☆186Updated 6 years ago
- Multiplatform payload dropper☆280Updated 4 years ago
- Automatically exported from code.google.com/p/ghost-phisher☆386Updated 5 years ago
- SS7 tools and scripts☆228Updated 5 years ago
- A Phishing Dropper designed to Pentest.☆276Updated 8 years ago
- Wireless Hacking, WiFi Security, Vulnerability Analyzer, Pentestration☆308Updated 3 years ago
- A simple python script to scan and attack wireless networks.☆203Updated 8 years ago
- Shodanwave is a tool for exploring and obtaining information from Netwave IP Camera.☆260Updated 5 years ago
- coWPAtty: WPA2-PSK Cracking☆228Updated 7 years ago
- Hostapd fork including Wi-Fi attacks and providing Python bindings with ctypes.☆185Updated 4 years ago
- Git all your favorite tools in one click☆269Updated 3 years ago
- Hakku Framework penetration testing☆351Updated 4 years ago
- Inject malicious code into *.debs☆280Updated 3 years ago
- Linset is a WPA/WPA2 phishing tool (evil twin)☆143Updated 2 years ago
- Bluetooth scanner for local devices that may be vulnerable to Blueborne exploit☆159Updated 8 years ago
- Bluetooth hacking tools☆470Updated 2 years ago
- 🍓📡🍍Monitor illegal wireless network activities. (Fake Access Points), (WiFi Threats: KARMA Attacks, WiFi Pineapple, Similar SSID, OPN …☆555Updated 5 years ago
- Quasar : An Information Gathering Framework For Lazy Penetration Testers☆162Updated 4 years ago
- Use hashcat to crack WPA2 PSK (Pre-Shared Key) passwords!☆78Updated 7 years ago
- Hacking systems with the automation of PasteJacking attacks.☆398Updated last year
- Arduino Rubber Ducky Framework☆107Updated 6 years ago
- Python plugin for Kismet to perform deauthentication to collect WPA2 handshakes☆100Updated 8 years ago
- Maltego Penetration Testing Transforms☆378Updated 6 years ago
- An advanced network scan and attack script based on GUI. 2nd version of no-GUI netattack.☆441Updated 7 years ago
- Linux bash script automation for metasploit☆270Updated 6 years ago
- Terminator metasploit payload generator☆180Updated 7 years ago
- Tools for information gathering☆355Updated last year
- Converts a USB Rubber ducky script into a Kali Nethunter friendly format for the HID attack☆143Updated 10 years ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy☆145Updated 8 years ago
- WebXploiter - An OWASP Top 10 Security scanner !☆90Updated 9 years ago