andrewmichaelsmith / bluepotLinks
Bluetooth Honeypot
☆261Updated 4 years ago
Alternatives and similar repositories for bluepot
Users that are interested in bluepot are comparing it to the libraries listed below
Sorting:
- An automated Wireless RogueAP MITM attack framework.☆186Updated 6 years ago
- Multiplatform payload dropper☆276Updated 4 years ago
- Automatically exported from code.google.com/p/ghost-phisher☆380Updated 5 years ago
- Wireless Hacking, WiFi Security, Vulnerability Analyzer, Pentestration☆302Updated 3 years ago
- A Phishing Dropper designed to Pentest.☆274Updated 8 years ago
- SS7 tools and scripts☆222Updated 5 years ago
- A simple python script to scan and attack wireless networks.☆193Updated 8 years ago
- Git all your favorite tools in one click☆269Updated 3 years ago
- Quasar : An Information Gathering Framework For Lazy Penetration Testers☆160Updated 4 years ago
- Terminator metasploit payload generator☆180Updated 7 years ago
- Inject malicious code into *.debs☆276Updated 3 years ago
- Bluetooth scanner for local devices that may be vulnerable to Blueborne exploit☆154Updated 8 years ago
- 🍓📡🍍Monitor illegal wireless network activities. (Fake Access Points), (WiFi Threats: KARMA Attacks, WiFi Pineapple, Similar SSID, OPN …☆551Updated 5 years ago
- coWPAtty: WPA2-PSK Cracking☆222Updated 6 years ago
- Hostapd fork including Wi-Fi attacks and providing Python bindings with ctypes.☆183Updated 4 years ago
- Linset is a WPA/WPA2 phishing tool (evil twin)☆143Updated 2 years ago
- Python tool for phishing☆241Updated last year
- A framework for pentesters that facilitates evil twin attacks as well as exploiting other wifi vulnerabilities☆321Updated last year
- Shodanwave is a tool for exploring and obtaining information from Netwave IP Camera.☆257Updated 4 years ago
- Maltego Penetration Testing Transforms☆374Updated 6 years ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy☆145Updated 8 years ago
- Bluetooth hacking tools☆454Updated 2 years ago
- Converts a USB Rubber ducky script into a Kali Nethunter friendly format for the HID attack☆141Updated 10 years ago
- Linux bash script automation for metasploit☆267Updated 6 years ago
- Python script that will extract all saved passwords from your google chrome database on windows only☆79Updated 5 years ago
- Arduino Rubber Ducky Framework☆107Updated 6 years ago
- A unified console to perform the "kill chain" stages of attacks.☆206Updated 2 years ago
- Social engineering tool for human hacking☆122Updated 8 years ago
- Hacking systems with the automation of PasteJacking attacks.☆401Updated last year
- Hakku Framework penetration testing☆349Updated 4 years ago