Bluetooth Honeypot
☆267Apr 2, 2026Updated 2 weeks ago
Alternatives and similar repositories for bluepot
Users that are interested in bluepot are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Fake-AP to perform Evil Twin Attack☆143Jul 29, 2018Updated 7 years ago
- Fast SSH Scan and BruteForcer for most common credentials.☆96Jun 15, 2018Updated 7 years ago
- WiFi Cracking Tool (Using Evil Twin Attack) With Some Modification. (Only For Legal Purposes)☆282May 13, 2018Updated 7 years ago
- Tool to check if an app is installed on the target device through a link☆125Mar 13, 2020Updated 6 years ago
- This tool allows you to perform OSINT and reconnaissance on an organisation or an individual. It allows one to search 1.4 Billion clear t…☆533Dec 13, 2018Updated 7 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Inject malicious code into *.debs☆287Apr 26, 2022Updated 3 years ago
- Multiplatform payload dropper☆278Aug 17, 2021Updated 4 years ago
- Wordlist creator written in C to generate all possibilities of passwords☆92Jun 16, 2018Updated 7 years ago
- Web hacking framework with tools, exploits by python☆399Dec 8, 2022Updated 3 years ago
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆567May 3, 2024Updated last year
- Powerful framework for rogue access point attack.☆2,418Jan 9, 2024Updated 2 years ago
- Script that generates an Android App to hack SMS through WAN☆402Jan 15, 2025Updated last year
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- Detect evil urls that uses IDN Homograph Attack.☆208Jan 24, 2018Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Simple DNS honeypot script☆50Jan 23, 2026Updated 2 months ago
- [SUSPENDED PROJECT] aSYNcrone is a SYN Flood DDoS Tool! It has developed for educational purposes and gain knowledge on socket programmin…☆282May 11, 2024Updated last year
- Chrome Keylogger Extension | Post Exploitation Tool☆443Apr 26, 2022Updated 3 years ago
- Lima Installer was a web based Cydia alternative which was based around a central server system☆11Mar 23, 2024Updated 2 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆373Apr 27, 2023Updated 2 years ago
- A simple XSS finding tool☆112Nov 9, 2018Updated 7 years ago
- Script to generate a Win32 payload that can take images from the WebCam and send it to the attacker☆100Dec 18, 2018Updated 7 years ago
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,034May 27, 2020Updated 5 years ago
- An offline Wi-Fi Protected Setup brute-force utility☆1,698Apr 19, 2023Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Human and machine readable web vulnerability testing format☆196Sep 19, 2022Updated 3 years ago
- Generate unicode domains for IDN Homograph Attack and detect them.☆1,255Apr 26, 2022Updated 3 years ago
- Stego is an open-source and free steganography tool that lets you hide your secret message in an image or audio file. You will not notice…☆153Sep 11, 2021Updated 4 years ago
- Intelligent login bruteforcer.☆913Apr 27, 2023Updated 2 years ago
- Advanced MSF Payload Generator tool for Linux☆105Mar 17, 2025Updated last year
- Hijack services that relies on QR Code Authentication.☆273Dec 20, 2023Updated 2 years ago
- Reconnaissance Swiss Army Knife☆2,033Jan 26, 2021Updated 5 years ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆153Oct 20, 2018Updated 7 years ago
- DBC2 (DropboxC2) is a modular post-exploitation tool, composed of an agent running on the victim's machine, a controler, running on any m…☆310Oct 27, 2017Updated 8 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Honeypot for router backdoor (TCP 32764)☆19Feb 6, 2014Updated 12 years ago
- BlueMaho is GUI-shell (interface) for suite of tools for testing security of bluetooth devices. It is freeware, opensource, written on py…☆67Jun 28, 2016Updated 9 years ago
- A highly configurable Linux Bluetooth scanner with optional web interface.☆133Jul 16, 2019Updated 6 years ago
- ISeeYou is a Bash and Javascript tool to find the exact location of the users during social engineering or phishing engagements. Using ex…☆1,124Apr 5, 2019Updated 7 years ago
- A tool to help you manage your leaks☆34Nov 22, 2017Updated 8 years ago
- Efficient and advanced man in the middle framework☆2,179Mar 23, 2023Updated 3 years ago
- Penetration testing and auditing toolkit for Android apps.☆247Mar 8, 2025Updated last year