Man in the Middle analysis tool for Bluetooth.
☆536Feb 24, 2020Updated 6 years ago
Alternatives and similar repositories for btproxy
Users that are interested in btproxy are comparing it to the libraries listed below
Sorting:
- BtleJuice Bluetooth Smart (LE) Man-in-the-Middle framework☆829Oct 3, 2018Updated 7 years ago
- unix wildcard attacks☆137May 25, 2018Updated 7 years ago
- A Node.js package for BLE (Bluetooth Low Energy) security assessment using Man-in-the-Middle and other attacks☆808Jan 31, 2022Updated 4 years ago
- Crack and decrypt BLE encryption☆948Aug 26, 2021Updated 4 years ago
- BLESuite_CLI is a command line tool to enable an easier way to test Bluetooth Low Energy (BLE) devices☆34Aug 1, 2016Updated 9 years ago
- BadUSB 2.0 USB-HID MiTM POC☆288Jun 22, 2016Updated 9 years ago
- This repository is DEPRECATED, please use bettercap as this tool has been ported to its BLE modules.☆1,092Feb 19, 2019Updated 7 years ago
- Specify targets and run sets of tools against them☆386Apr 23, 2019Updated 6 years ago
- PROJECT DELTA: SDN SECURITY EVALUATION FRAMEWORK☆223Apr 15, 2019Updated 6 years ago
- Universal Serial aBUSe is a project to demonstrate the risks of hardware bypasses of software security by Rogan Dawes at SensePost.☆500Aug 11, 2017Updated 8 years ago
- Reverse NTP remote access trojan in python, for penetration testers☆62Oct 11, 2015Updated 10 years ago
- A collection of post-exploitation tools for network red teaming.☆138Dec 7, 2018Updated 7 years ago
- Certified Edible Dinosaurs official CTF toolkit☆119Apr 2, 2018Updated 7 years ago
- An easy-to-deploy virtual machine that can provide flexible man-in-the-middle capabilities.☆205Aug 29, 2016Updated 9 years ago
- Next-gen BurpSuite penetration testing tool☆460Jan 27, 2016Updated 10 years ago
- ☆106Feb 2, 2016Updated 10 years ago
- DEPRECATED, bettercap developement moved here: https://github.com/bettercap/bettercap☆2,495Feb 27, 2018Updated 8 years ago
- "Repeater" style XSS post-exploitation tool for mass browser control. Primarily a PoC to show why HttpOnly flag isn't a complete protecti…☆138Dec 22, 2017Updated 8 years ago
- Malicious HTTP traffic explorer☆724Mar 16, 2023Updated 2 years ago
- Router EXploitation Toolkit - small toolkit for easy creation and usage of various python scripts that work with embedded devices.☆347Dec 25, 2016Updated 9 years ago
- Recon, Subdomain Bruting, Zone Transfers☆229Aug 2, 2016Updated 9 years ago
- The iOS Security Testing Framework☆1,383Oct 25, 2020Updated 5 years ago
- ☆167Apr 2, 2017Updated 8 years ago
- Various pentest scripts☆14Mar 17, 2014Updated 11 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- The USB host security assessment tool☆285Nov 28, 2018Updated 7 years ago
- CANToolz - framework for black-box CAN network analysis☆313Oct 31, 2017Updated 8 years ago
- A framework for wireless pentesting.☆1,229Oct 14, 2020Updated 5 years ago
- An Online Analysis System for Packed Android Malware☆107Jul 28, 2016Updated 9 years ago
- Sniffs sensitive data from interface or pcap☆1,813Nov 2, 2023Updated 2 years ago
- REST/JSON interface to Burp Suite☆33Oct 12, 2020Updated 5 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆26Jun 24, 2017Updated 8 years ago
- An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction☆1,118Dec 2, 2021Updated 4 years ago
- powerful auto-backdooring utility☆750Dec 20, 2017Updated 8 years ago
- BLESuite is a Python package that provides an easier way to test Bluetooth Low Energy (BLE) device☆190Oct 9, 2020Updated 5 years ago
- Metaphor - Stagefright with ASLR bypass☆317Mar 24, 2016Updated 9 years ago
- ☆27Jul 18, 2017Updated 8 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- DEPRECATED, wifipumpkin3 -> https://github.com/P0cL4bs/wifipumpkin3☆3,153Apr 18, 2020Updated 5 years ago