ekomsSavior / AirBorne-PoCLinks
poc for CVE-2025-24252 & CVE-2025-24132
☆123Updated 3 months ago
Alternatives and similar repositories for AirBorne-PoC
Users that are interested in AirBorne-PoC are comparing it to the libraries listed below
Sorting:
- Wireless Hacking Devices Protocol client☆231Updated this week
- ☆223Updated last year
- exploits for CVE-2024-20017☆139Updated last year
- BlueToolkit is an extensible Bluetooth Classic vulnerability testing framework that helps uncover new and old vulnerabilities in Bluetoo…☆551Updated 3 weeks ago
- The iOS Buster is a groundbreaking penetration testing tool for iOS, capable of performing both static and dynamic testing. It provides d…☆25Updated last year
- A tool to crack WPA2 passphrase with PMKID value without clients or de-authentication☆219Updated 2 years ago
- Bluetooth Security Assessment Methodology☆134Updated last year
- A repo for TPM sniffing greatness☆234Updated 2 months ago
- ☆127Updated last year
- A 5G Sniffer and Downlink Injector Framework on steroids... And yes, Wireshark supported!!!☆229Updated this week
- mapAccountHijack is a tool designed to carry out a MAP Account hijack attack, which exploits the Message Access Profile (MAP) in Bluetoot…☆54Updated 7 months ago
- A tool for generating detailed, locally-processed reports from iOS backups, supporting encrypted and unencrypted data.☆63Updated 10 months ago
- This is a shell script that creates an SSH backdoor on an iPhone.☆222Updated 11 months ago
- CVE-2024-6387 (regreSSHion) Exploit (PoC), a vulnerability in OpenSSH's server (sshd) on glibc-based Linux systems.☆53Updated last year
- CellGuard is a research project that analyzes how cellular networks are operated and possibly surveilled☆134Updated last week
- Autofill Phishing☆76Updated 3 weeks ago
- HikvisionExploiter is a Python-based utility designed to automate exploitation and directory accessibility checks on Hikvision network ca…☆149Updated last month
- Unlock Exclusive Insights! 🚀📖 Download My FREE E-Zine Now ➡️ Over 170 Pages of Essential Content! Elevate your hardware hacking game w…☆223Updated last year
- 🚀 A powerful multi-platform RF toolbox that deploys specialized radio tools in seconds on Linux, Windows, and macOS—supporting x86_64, A…☆239Updated last week
- 🛠️ Ultimate Hardware Hacking Guide | IoT security, embedded systems, UART/SPI analysis, and hardware reverse engineering☆30Updated last month
- A framework to kickstart yourself in making malicious USB devices using ATTiny85.☆12Updated 3 months ago
- ☆706Updated last year
- Collection of my Security Blueprints & Guides☆51Updated last month
- Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely☆72Updated last year
- IoT Camera Reconnaissance and Live Viewer☆157Updated last year
- ☆56Updated 2 years ago
- Phone: A Mobile Phone Forensic Framework ( Android )☆202Updated 6 months ago
- Hacking Hotspots: Pre-Auth Remote Code Execution, Arbitrary SMS & Adjacent Attacks on 5G & 4G/LTE Routers☆86Updated 2 weeks ago
- Evil Crow Cable Pro device☆120Updated 5 months ago
- Android App Pin Security Issue Allowing Unauthorized Payments via Google Wallet☆73Updated last year