Bluetooth Honeypot
☆267Apr 2, 2026Updated last month
Alternatives and similar repositories for bluepot
Users that are interested in bluepot are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Fake-AP to perform Evil Twin Attack☆150Jul 29, 2018Updated 7 years ago
- Fast SSH Scan and BruteForcer for most common credentials.☆99Jun 15, 2018Updated 7 years ago
- WiFi Cracking Tool (Using Evil Twin Attack) With Some Modification. (Only For Legal Purposes)☆283May 13, 2018Updated 7 years ago
- Tool to check if an app is installed on the target device through a link☆131Mar 13, 2020Updated 6 years ago
- This tool allows you to perform OSINT and reconnaissance on an organisation or an individual. It allows one to search 1.4 Billion clear t…☆542Dec 13, 2018Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Inject malicious code into *.debs☆287Apr 26, 2022Updated 4 years ago
- Multiplatform payload dropper☆279Aug 17, 2021Updated 4 years ago
- Wordlist creator written in C to generate all possibilities of passwords☆93Jun 16, 2018Updated 7 years ago
- Web hacking framework with tools, exploits by python☆403Dec 8, 2022Updated 3 years ago
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆566May 3, 2024Updated 2 years ago
- Powerful framework for rogue access point attack.☆2,447Jan 9, 2024Updated 2 years ago
- Script that generates an Android App to hack SMS through WAN☆409Jan 15, 2025Updated last year
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 8 years ago
- Detect evil urls that uses IDN Homograph Attack.☆208Jan 24, 2018Updated 8 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Simple DNS honeypot script☆50Jan 23, 2026Updated 3 months ago
- Lima Installer was a web based Cydia alternative which was based around a central server system☆11Mar 23, 2024Updated 2 years ago
- Chrome Keylogger Extension | Post Exploitation Tool☆442Apr 26, 2022Updated 4 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆374Apr 27, 2023Updated 3 years ago
- A simple XSS finding tool☆111Nov 9, 2018Updated 7 years ago
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,035May 27, 2020Updated 5 years ago
- Script to generate a Win32 payload that can take images from the WebCam and send it to the attacker☆106Dec 18, 2018Updated 7 years ago
- An offline Wi-Fi Protected Setup brute-force utility☆1,699Apr 17, 2026Updated 3 weeks ago
- Human and machine readable web vulnerability testing format☆194Sep 19, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Generate unicode domains for IDN Homograph Attack and detect them.☆1,259Apr 26, 2022Updated 4 years ago
- Stego is an open-source and free steganography tool that lets you hide your secret message in an image or audio file. You will not notice…☆155Sep 11, 2021Updated 4 years ago
- Intelligent login bruteforcer.☆914Apr 27, 2023Updated 3 years ago
- Advanced MSF Payload Generator tool for Linux☆105Mar 17, 2025Updated last year
- Hijack services that relies on QR Code Authentication.☆274Dec 20, 2023Updated 2 years ago
- Reconnaissance Swiss Army Knife☆2,045Jan 26, 2021Updated 5 years ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆153Oct 20, 2018Updated 7 years ago
- DBC2 (DropboxC2) is a modular post-exploitation tool, composed of an agent running on the victim's machine, a controler, running on any m…☆309Oct 27, 2017Updated 8 years ago
- Honeypot for router backdoor (TCP 32764)☆19Feb 6, 2014Updated 12 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- BlueMaho is GUI-shell (interface) for suite of tools for testing security of bluetooth devices. It is freeware, opensource, written on py…☆68Jun 28, 2016Updated 9 years ago
- A highly configurable Linux Bluetooth scanner with optional web interface.☆133Jul 16, 2019Updated 6 years ago
- ISeeYou is a Bash and Javascript tool to find the exact location of the users during social engineering or phishing engagements. Using ex…☆1,137Apr 5, 2019Updated 7 years ago
- A tool to help you manage your leaks☆35Nov 22, 2017Updated 8 years ago
- Efficient and advanced man in the middle framework☆2,180Mar 23, 2023Updated 3 years ago
- Penetration testing and auditing toolkit for Android apps.☆247Mar 8, 2025Updated last year
- Elasticsearch honeypot written in Python with Bottle framework☆18Apr 12, 2019Updated 7 years ago