andrewmichaelsmith / bluepotLinks
Bluetooth Honeypot
☆261Updated 4 years ago
Alternatives and similar repositories for bluepot
Users that are interested in bluepot are comparing it to the libraries listed below
Sorting:
- An automated Wireless RogueAP MITM attack framework.☆187Updated 6 years ago
- Multiplatform payload dropper☆276Updated 4 years ago
- Automatically exported from code.google.com/p/ghost-phisher☆376Updated 5 years ago
- A Phishing Dropper designed to Pentest.☆273Updated 8 years ago
- Wireless Hacking, WiFi Security, Vulnerability Analyzer, Pentestration☆295Updated 2 years ago
- A simple python script to scan and attack wireless networks.☆193Updated 8 years ago
- Git all your favorite tools in one click☆269Updated 3 years ago
- Shodanwave is a tool for exploring and obtaining information from Netwave IP Camera.☆256Updated 4 years ago
- Hostapd fork including Wi-Fi attacks and providing Python bindings with ctypes.☆184Updated 4 years ago
- coWPAtty: WPA2-PSK Cracking☆220Updated 6 years ago
- SS7 tools and scripts☆216Updated 5 years ago
- Inject malicious code into *.debs☆279Updated 3 years ago
- Hakku Framework penetration testing☆346Updated 3 years ago
- Linset is a WPA/WPA2 phishing tool (evil twin)☆142Updated last year
- Converts a USB Rubber ducky script into a Kali Nethunter friendly format for the HID attack☆139Updated 10 years ago
- Tools for information gathering☆346Updated last year
- Bluetooth scanner for local devices that may be vulnerable to Blueborne exploit☆153Updated 7 years ago
- Linux bash script automation for metasploit☆265Updated 6 years ago
- Use hashcat to crack WPA2 PSK (Pre-Shared Key) passwords!☆77Updated 7 years ago
- Quasar : An Information Gathering Framework For Lazy Penetration Testers☆157Updated 4 years ago
- Terminator metasploit payload generator☆181Updated 7 years ago
- 🍓📡🍍Monitor illegal wireless network activities. (Fake Access Points), (WiFi Threats: KARMA Attacks, WiFi Pineapple, Similar SSID, OPN …☆547Updated 5 years ago
- An advanced network scan and attack script based on GUI. 2nd version of no-GUI netattack.☆434Updated 7 years ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy☆145Updated 8 years ago
- IP Cam Shell is a command line script for testing and exploiting a wide range of IP cameras as demonstrated by Craig Heffner in "Exploiti…☆142Updated 8 years ago
- Browser Exploitation Framework is a Open-source penetration testing tool that focuses on browser-based vulnerabilities .This Python Scrip…☆161Updated last year
- Bluetooth hacking tools☆444Updated 2 years ago
- Community-built scenarios for Wifiphisher☆367Updated 4 years ago
- Arduino Rubber Ducky Framework☆107Updated 6 years ago
- bluesnarfing proof-of-concept tool.☆51Updated 9 years ago