DoS Attacks on Bluetooth Devices for pentest purposes
☆32Nov 22, 2025Updated 3 months ago
Alternatives and similar repositories for EvilBlue
Users that are interested in EvilBlue are comparing it to the libraries listed below
Sorting:
- Python scripts and tools built during my learning journey☆31Nov 14, 2025Updated 3 months ago
- ddos-checker is a tool used to perform a test on a website from a DDOS attack to find security gaps in a website.☆11Oct 16, 2025Updated 4 months ago
- Advanced mobile security research platform for authorized testing and educational purposes☆13Oct 4, 2025Updated 5 months ago
- Quantum zero-day exploit Hunting for vulnerabilities as small as a quantum particle☆13Jun 13, 2025Updated 8 months ago
- ☆42Apr 21, 2025Updated 10 months ago
- Professional AI Hacking Platform☆59Oct 29, 2025Updated 4 months ago
- ☆12Mar 8, 2025Updated 11 months ago
- A NIGHT miner for the Midnight Scavenger Hunt☆40Jan 19, 2026Updated last month
- Modern Phishing Tool With Advanced Functionality And Multiple Tunnelling Services [ Android-Support-Available ]☆11Nov 14, 2020Updated 5 years ago
- Automation of some MAPT activities and interaction with the mobile Android device.☆22Sep 28, 2025Updated 5 months ago
- Decentralised Energy Market☆12Feb 19, 2018Updated 8 years ago
- Payment rails made right. Award winning developer experience.☆28Jan 27, 2026Updated last month
- Curated list of 20,000+ hours and 200+ free courses with certificates in IT, CS, Design and Business.☆20Nov 8, 2025Updated 3 months ago
- ☆10Apr 18, 2019Updated 6 years ago
- Mycroft is a Offline File Analyzer and Metadata Scraper☆26Feb 21, 2026Updated last week
- ☆11Nov 12, 2017Updated 8 years ago
- This Python-based DDoS tool for Termux enables stress testing with TCP, UDP, HTTP, and HTTPS flood attacks, featuring domain resolution, …☆17Nov 10, 2024Updated last year
- The reach JS stdlib. This repo exists only for convenience when interacting with npm. See https://github.com/reach-sh/reach-lang for sour…☆10Mar 1, 2023Updated 3 years ago
- Nemesys: A personal educational project designed to automate the discovery of vulnerabilities 🕵️♂️ using Metasploit 🚀. Learn how to id…☆13May 25, 2025Updated 9 months ago
- Video Steganography for Piracy Prevention☆12Oct 16, 2016Updated 9 years ago
- WiFisploit is a tool designed to scan and attack Wi-Fi networks using variety of powerful and effective attacks. It contains numerous com…☆43Jun 16, 2025Updated 8 months ago
- X-overdos is a A tool for performing DoS attack tests with many methods such as Layer 2, Layer 4, and also Layer 7.☆10Oct 16, 2025Updated 4 months ago
- 🪐Bot likes, followers, shares and views on TikTok! ~ fast zefoy☆13Apr 25, 2023Updated 2 years ago
- 虚幻通用接口☆10Nov 11, 2025Updated 3 months ago
- Same @Mebus/cupp tool but best speed and Creates every possible word using the information you provide.☆20Nov 30, 2025Updated 3 months ago
- A Maple flavored proxy factory☆12Oct 10, 2024Updated last year
- ☆13Jan 12, 2023Updated 3 years ago
- Script spam sms, call & wa versi 1.0☆17May 24, 2025Updated 9 months ago
- Scrapes headlines from CNN and FOX, then has ChatGPT do cross-analysis☆11Apr 19, 2023Updated 2 years ago
- This is a simple tool to automatically deface vulnerable websites☆12Oct 16, 2025Updated 4 months ago
- ☆14May 9, 2023Updated 2 years ago
- deface-X is an automatic deface tool used to inject a website☆13Oct 16, 2025Updated 4 months ago
- Advanced Ip Tracker Tool☆11Apr 7, 2022Updated 3 years ago
- Multi-AI orchestration plugin for Claude Code with sequential reviews, Codex final gate, and hook-based enforcement☆20Feb 22, 2026Updated last week
- Two way bridge contracts☆10Jan 15, 2026Updated last month
- ☆23Jun 28, 2025Updated 8 months ago
- A tool that automates fileless SSH backdoor injection—bypassing CA checks, erasing logs, creating long‑lived (up to 9999 days) passwordle…☆28Jan 30, 2026Updated last month
- Smart contracts for the Vela Exchange perpetual trading platform☆11Apr 13, 2023Updated 2 years ago
- Wireless pentesting tool with functionalities such as password cracking (in WEP and WPA/WPA2 networks), DoS attacks, client de-authentica…☆12Apr 8, 2024Updated last year