andrewmichaelsmith / bluepotLinks
Bluetooth Honeypot
☆263Updated 4 years ago
Alternatives and similar repositories for bluepot
Users that are interested in bluepot are comparing it to the libraries listed below
Sorting:
- An automated Wireless RogueAP MITM attack framework.☆186Updated 6 years ago
- Wireless Hacking, WiFi Security, Vulnerability Analyzer, Pentestration☆305Updated 3 years ago
- Automatically exported from code.google.com/p/ghost-phisher☆382Updated 5 years ago
- Multiplatform payload dropper☆275Updated 4 years ago
- 🍓📡🍍Monitor illegal wireless network activities. (Fake Access Points), (WiFi Threats: KARMA Attacks, WiFi Pineapple, Similar SSID, OPN …☆553Updated 5 years ago
- SS7 tools and scripts☆223Updated 5 years ago
- Git all your favorite tools in one click☆269Updated 3 years ago
- A Phishing Dropper designed to Pentest.☆274Updated 8 years ago
- Bluetooth scanner for local devices that may be vulnerable to Blueborne exploit☆155Updated 8 years ago
- Hostapd fork including Wi-Fi attacks and providing Python bindings with ctypes.☆183Updated 4 years ago
- Shodanwave is a tool for exploring and obtaining information from Netwave IP Camera.☆257Updated 5 years ago
- A simple python script to scan and attack wireless networks.☆197Updated 8 years ago
- An advanced network scan and attack script based on GUI. 2nd version of no-GUI netattack.☆440Updated 7 years ago
- coWPAtty: WPA2-PSK Cracking☆225Updated 6 years ago
- Use hashcat to crack WPA2 PSK (Pre-Shared Key) passwords!☆78Updated 7 years ago
- Inject malicious code into *.debs☆276Updated 3 years ago
- Converts a USB Rubber ducky script into a Kali Nethunter friendly format for the HID attack☆141Updated 10 years ago
- Hakku Framework penetration testing☆350Updated 4 years ago
- Linux bash script automation for metasploit☆267Updated 6 years ago
- Quasar : An Information Gathering Framework For Lazy Penetration Testers☆162Updated 4 years ago
- A unified console to perform the "kill chain" stages of attacks.☆206Updated 2 years ago
- Framework designed to automate various wireless networks attacks (the project was presented on Pentester Academy TV's toolbox in 2017).☆643Updated 3 years ago
- Terminator metasploit payload generator☆180Updated 7 years ago
- Sets Transparent proxy tunnel through Tor, I2P, Privoxy, Polipo and modify DNS; Include Anonymizing Relay Monitor (arm), macchanger and w…☆317Updated 3 years ago
- Maltego Penetration Testing Transforms☆375Updated 6 years ago
- A framework for pentesters that facilitates evil twin attacks as well as exploiting other wifi vulnerabilities☆324Updated last year
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy☆145Updated 8 years ago
- Tools for information gathering☆352Updated last year
- Social engineering tool for human hacking☆122Updated 9 years ago
- Linset is a WPA/WPA2 phishing tool (evil twin)☆143Updated 2 years ago