ekomsSavior / AirBorne-PoCLinks
poc for CVE-2025-24252 & CVE-2025-24132
☆106Updated 3 weeks ago
Alternatives and similar repositories for AirBorne-PoC
Users that are interested in AirBorne-PoC are comparing it to the libraries listed below
Sorting:
- exploits for CVE-2024-20017☆137Updated 9 months ago
- Wireless Hacking Devices Protocol client☆198Updated this week
- mapAccountHijack is a tool designed to carry out a MAP Account hijack attack, which exploits the Message Access Profile (MAP) in Bluetoot…☆50Updated 4 months ago
- PoC RCE in OpenSSH☆23Updated 11 months ago
- The iOS Buster is a groundbreaking penetration testing tool for iOS, capable of performing both static and dynamic testing. It provides d…☆24Updated last year
- BlueToolkit is an extensible Bluetooth Classic vulnerability testing framework that helps uncover new and old vulnerabilities in Bluetoo…☆469Updated last week
- A tool for generating detailed, locally-processed reports from iOS backups, supporting encrypted and unencrypted data.☆59Updated 8 months ago
- Collection of my Security Blueprints & Guides☆50Updated 3 weeks ago
- Faulty Cat is a low-cost Electromagnetic Fault Injection (EMFI) tool, designed specifically for self-study and hobbiest research.☆80Updated this week
- Moxie scans & tests MQTT services. Secure your IoT infrastructure!☆46Updated last year
- BrutDroid — Android Emulator Automation Toolkit☆173Updated 2 weeks ago
- CellGuard is a research project that analyzes how cellular networks are operated and possibly surveilled☆120Updated last week
- ☆199Updated 10 months ago
- ☆123Updated last year
- PwnPad is an affordable, hands-on hardware hacking platform built for practical learning. It features a range of challenges that walk use…☆81Updated 3 weeks ago
- Bluetooth Security Assessment Methodology☆132Updated last year
- PoC for CVE-2024-48990☆98Updated 7 months ago
- 🚀 A powerful multi-platform RF toolbox that deploys specialized radio tools in seconds on Linux, Windows, and macOS—supporting x86_64, A…☆196Updated last week
- Your ultimate guide to Hardware Hacking☆22Updated last month
- A repo for TPM sniffing greatness☆230Updated last month
- A tool to explore USB-C on Apple devices using the Tamarin C Hardware.☆212Updated last year
- ☆56Updated last year
- BLE pentesting scripts☆68Updated 2 years ago
- POC for CVE-2024-27804☆134Updated last year
- CVE-2024-6387 (regreSSHion) Exploit (PoC), a vulnerability in OpenSSH's server (sshd) on glibc-based Linux systems.☆52Updated 11 months ago
- DorkEye is a Python script for ethical dorking. The goal is to identify unintentionally exposed resources, such as sensitive files, login…☆47Updated 3 weeks ago
- CVE-2025-29927 Proof of Concept☆78Updated 3 months ago
- Generate Frida bypass scripts for Android APK root and SSL checks.☆133Updated 2 weeks ago
- ☆41Updated last year
- bitpixie Proof of Concept - Bitlocker Decryptor☆69Updated last week