darkmentorllc / Blue2thprintingLinks
Code associated with the talk "Blue2thprinting (blue-[tooth)-printing]: answering the question of 'WTF am I even looking at?!'"
☆59Updated last month
Alternatives and similar repositories for Blue2thprinting
Users that are interested in Blue2thprinting are comparing it to the libraries listed below
Sorting:
- OSDP attack tool (and the Elvish word for friend)☆107Updated 2 years ago
- Bluetooth Security Assessment Methodology☆139Updated last year
- RattaGATTa: Scalable Bluetooth Low-Energy Survey Using a pool of collectors to scan and connect to BTLE devices, shedding light on the in…☆42Updated 10 months ago
- Interactive terminal based tool to configure a Raspberry Pi into a transparent Wifi based proxy with traffic tunnelling support☆29Updated last year
- Full Build Guide for making your own RFID Gooseneck Long Range Reader!☆61Updated 4 months ago
- This is a opensource repo about how to detect android malware using Random Forest Classifier and explain it use linearsvc.☆11Updated last year
- Flipper Zero firmware source code + Dict attack improvements☆61Updated 2 years ago
- ☆130Updated 2 years ago
- Convert Nmap output for integration with other Project Discovery tools☆15Updated 2 years ago
- Generate a report with charts and statistics about cracked passwords in XLSX format☆36Updated this week
- ☆116Updated 2 years ago
- Still point in moving world.☆49Updated 3 years ago
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Updated last week
- A VS Code extension to preview XML nmap output☆44Updated 9 months ago
- Secret Scanner for Slack, Jira, Confluence, Asana, Wrike, Linear, Zendesk, GitHub, and GitLab☆69Updated last week
- RF-modulated high fidelity laser microphone and keystroke sniffer☆82Updated last year
- Research on the Gallagher / Cardax access control system☆67Updated 5 years ago
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆90Updated 3 years ago
- An Evil OIDC Server☆54Updated 3 years ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Updated last year
- The hydrabus framework core [Not maintained anymore - see readme]☆21Updated 2 years ago
- Card calculator and Proxmark3 Plugin for writing and/or simulating every card type that Doppelgänger Community, Pro, Stealth, and MFAS su…☆25Updated 2 months ago
- Force target victim to unsafe network☆29Updated 6 months ago
- The Multi-Protocol Swiss-Army-Knife for Hardware Hackers (UART/JTAG/SPI/I2C)☆84Updated last year
- ☆19Updated last year
- ☆22Updated last year
- A distributed hashcat implementation using Salad Cloud and Hashtopolis☆40Updated last year
- ☆41Updated 4 years ago
- ☆25Updated last year
- 🚀 A powerful multi-platform RF toolbox that deploys specialized radio tools in seconds on Linux, Windows, and macOS—supporting x86_64, A…☆259Updated this week