ekomsSavior / AirBorne-PoCLinks
poc for CVE-2025-24252 & CVE-2025-24132
☆144Updated 7 months ago
Alternatives and similar repositories for AirBorne-PoC
Users that are interested in AirBorne-PoC are comparing it to the libraries listed below
Sorting:
- Wireless Hacking Devices Protocol client☆266Updated last week
- exploits for CVE-2024-20017☆141Updated last year
- ☆234Updated last year
- BlueToolkit is an extensible Bluetooth Classic vulnerability testing framework that helps uncover new and old vulnerabilities in Bluetoo…☆633Updated 3 months ago
- A 5G Sniffer and Downlink Injector Framework on steroids... And yes, Wireshark supported!!!☆260Updated 3 weeks ago
- A tool to crack WPA2 passphrase with PMKID value without clients or de-authentication☆226Updated 2 years ago
- CVE-2025-31200 is a zero-day, zero-click RCE in iOS CoreAudio’s AudioConverterService, triggered by a malicious audio file via iMessage/S…☆139Updated this week
- Bluetooth Security Assessment Methodology☆140Updated last year
- Autofill Phishing☆85Updated 4 months ago
- ☆55Updated 2 years ago
- HikvisionExploiter is a Python-based utility designed to automate exploitation and directory accessibility checks on Hikvision network ca…☆310Updated this week
- Hacking Hotspots: Pre-Auth Remote Code Execution, Arbitrary SMS & Adjacent Attacks on 5G & 4G/LTE Routers☆92Updated 3 months ago
- mapAccountHijack is a tool designed to carry out a MAP Account hijack attack, which exploits the Message Access Profile (MAP) in Bluetoot…☆59Updated 10 months ago
- CVE-2024-6387 (regreSSHion) Exploit (PoC), a vulnerability in OpenSSH's server (sshd) on glibc-based Linux systems.☆62Updated last year
- 🚀 A powerful multi-platform RF toolbox that deploys specialized radio tools in seconds on Linux, Windows, and macOS—supporting x86_64, A…☆265Updated 3 weeks ago
- A tool for generating detailed, locally-processed reports from iOS backups, supporting encrypted and unencrypted data.☆61Updated last year
- The RF Automotive tool allow you to unlock cars☆53Updated 3 months ago
- This is a shell script that creates an SSH backdoor on an iPhone.☆226Updated last year
- A framework to kickstart yourself in making malicious USB devices using ATTiny85.☆14Updated 6 months ago
- 🛠️ Ultimate Hardware Hacking Guide | IoT security, embedded systems, UART/SPI analysis, and hardware reverse engineering☆38Updated 5 months ago
- BEERUS Framework for Android☆531Updated 3 months ago
- CellGuard is a research project that analyzes how cellular networks are operated and possibly surveilled☆141Updated 2 weeks ago
- Evil Crow Cable Pro device☆131Updated 2 months ago
- Phone: A Mobile Phone Forensic Framework ( Android )☆207Updated 9 months ago
- Turning smart lights into Wifi Hacking implants.☆165Updated 10 months ago
- PoC RCE in OpenSSH☆24Updated last year
- A repo for TPM sniffing greatness☆242Updated last week
- Bookmarklet to find endpoints easily with one click☆72Updated last year
- Collection of USB hacking links and materials for my talk on the topic☆364Updated 3 months ago
- ☆12Updated last year