Bluetooth Honeypot
☆268Jan 2, 2021Updated 5 years ago
Alternatives and similar repositories for bluepot
Users that are interested in bluepot are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Fake-AP to perform Evil Twin Attack☆144Jul 29, 2018Updated 7 years ago
- Fast SSH Scan and BruteForcer for most common credentials.☆96Jun 15, 2018Updated 7 years ago
- WiFi Cracking Tool (Using Evil Twin Attack) With Some Modification. (Only For Legal Purposes)☆281May 13, 2018Updated 7 years ago
- Tool to check if an app is installed on the target device through a link☆125Mar 13, 2020Updated 6 years ago
- This tool allows you to perform OSINT and reconnaissance on an organisation or an individual. It allows one to search 1.4 Billion clear t…☆530Dec 13, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Inject malicious code into *.debs☆285Apr 26, 2022Updated 3 years ago
- Multiplatform payload dropper☆281Aug 17, 2021Updated 4 years ago
- Wordlist creator written in C to generate all possibilities of passwords☆90Jun 16, 2018Updated 7 years ago
- Web hacking framework with tools, exploits by python☆395Dec 8, 2022Updated 3 years ago
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆566May 3, 2024Updated last year
- Powerful framework for rogue access point attack.☆2,412Jan 9, 2024Updated 2 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- Detect evil urls that uses IDN Homograph Attack.☆206Jan 24, 2018Updated 8 years ago
- Simple DNS honeypot script☆51Jan 23, 2026Updated 2 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- [SUSPENDED PROJECT] aSYNcrone is a SYN Flood DDoS Tool! It has developed for educational purposes and gain knowledge on socket programmin…☆283May 11, 2024Updated last year
- Chrome Keylogger Extension | Post Exploitation Tool☆440Apr 26, 2022Updated 3 years ago
- Lima Installer was a web based Cydia alternative which was based around a central server system☆11Mar 23, 2024Updated 2 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆373Apr 27, 2023Updated 2 years ago
- A simple XSS finding tool☆111Nov 9, 2018Updated 7 years ago
- Script to generate a Win32 payload that can take images from the WebCam and send it to the attacker☆100Dec 18, 2018Updated 7 years ago
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,034May 27, 2020Updated 5 years ago
- An offline Wi-Fi Protected Setup brute-force utility☆1,699Apr 19, 2023Updated 2 years ago
- Human and machine readable web vulnerability testing format☆195Sep 19, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Stego is an open-source and free steganography tool that lets you hide your secret message in an image or audio file. You will not notice…☆153Sep 11, 2021Updated 4 years ago
- Generate unicode domains for IDN Homograph Attack and detect them.☆1,252Apr 26, 2022Updated 3 years ago
- Advanced MSF Payload Generator tool for Linux☆104Mar 17, 2025Updated last year
- Intelligent login bruteforcer.☆912Apr 27, 2023Updated 2 years ago
- Hijack services that relies on QR Code Authentication.☆272Dec 20, 2023Updated 2 years ago
- Reconnaissance Swiss Army Knife☆2,023Jan 26, 2021Updated 5 years ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆153Oct 20, 2018Updated 7 years ago
- DBC2 (DropboxC2) is a modular post-exploitation tool, composed of an agent running on the victim's machine, a controler, running on any m…☆308Oct 27, 2017Updated 8 years ago
- Honeypot for router backdoor (TCP 32764)☆19Feb 6, 2014Updated 12 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- BlueMaho is GUI-shell (interface) for suite of tools for testing security of bluetooth devices. It is freeware, opensource, written on py…☆67Jun 28, 2016Updated 9 years ago
- A highly configurable Linux Bluetooth scanner with optional web interface.☆132Jul 16, 2019Updated 6 years ago
- ISeeYou is a Bash and Javascript tool to find the exact location of the users during social engineering or phishing engagements. Using ex…☆1,113Apr 5, 2019Updated 6 years ago
- A tool to help you manage your leaks☆34Nov 22, 2017Updated 8 years ago
- Efficient and advanced man in the middle framework☆2,178Mar 23, 2023Updated 3 years ago
- Elasticsearch honeypot written in Python with Bottle framework☆18Apr 12, 2019Updated 6 years ago
- Penetration testing and auditing toolkit for Android apps.☆247Mar 8, 2025Updated last year