ekomsSavior / AirBorne-PoCLinks
poc for CVE-2025-24252 & CVE-2025-24132
☆140Updated 6 months ago
Alternatives and similar repositories for AirBorne-PoC
Users that are interested in AirBorne-PoC are comparing it to the libraries listed below
Sorting:
- Wireless Hacking Devices Protocol client☆264Updated last week
- BlueToolkit is an extensible Bluetooth Classic vulnerability testing framework that helps uncover new and old vulnerabilities in Bluetoo…☆620Updated 3 months ago
- exploits for CVE-2024-20017☆142Updated last year
- CVE-2025-31200 is a zero-day, zero-click RCE in iOS CoreAudio’s AudioConverterService, triggered by a malicious audio file via iMessage/S…☆76Updated 2 weeks ago
- ☆234Updated last year
- A 5G Sniffer and Downlink Injector Framework on steroids... And yes, Wireshark supported!!!☆255Updated last week
- A tool to crack WPA2 passphrase with PMKID value without clients or de-authentication☆226Updated 2 years ago
- Autofill Phishing☆84Updated 3 months ago
- Bluetooth Security Assessment Methodology☆139Updated last year
- This is a shell script that creates an SSH backdoor on an iPhone.☆225Updated last year
- The RF Automotive tool allow you to unlock cars☆51Updated 2 months ago
- mapAccountHijack is a tool designed to carry out a MAP Account hijack attack, which exploits the Message Access Profile (MAP) in Bluetoot…☆56Updated 10 months ago
- ☆55Updated 2 years ago
- 🛠️ Ultimate Hardware Hacking Guide | IoT security, embedded systems, UART/SPI analysis, and hardware reverse engineering☆38Updated 4 months ago
- A tool for generating detailed, locally-processed reports from iOS backups, supporting encrypted and unencrypted data.☆61Updated last year
- BEERUS Framework for Android☆505Updated 2 months ago
- CVE-2024-6387 (regreSSHion) Exploit (PoC), a vulnerability in OpenSSH's server (sshd) on glibc-based Linux systems.☆61Updated last year
- Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)☆161Updated last year
- CellGuard is a research project that analyzes how cellular networks are operated and possibly surveilled☆141Updated last week
- ☆717Updated last year
- Bookmarklet to find endpoints easily with one click☆70Updated last year
- A repo for TPM sniffing greatness☆241Updated 2 weeks ago
- 🚀 A powerful multi-platform RF toolbox that deploys specialized radio tools in seconds on Linux, Windows, and macOS—supporting x86_64, A…☆259Updated last week
- The iOS Buster is a groundbreaking penetration testing tool for iOS, capable of performing both static and dynamic testing. It provides d…☆24Updated last year
- Collection of USB hacking links and materials for my talk on the topic☆359Updated 3 months ago
- Unlock Exclusive Insights! 🚀📖 Download My FREE E-Zine Now ➡️ Over 170 Pages of Essential Content! Elevate your hardware hacking game w…☆232Updated last year
- HikvisionExploiter is a Python-based utility designed to automate exploitation and directory accessibility checks on Hikvision network ca…☆303Updated 4 months ago
- Hacking Hotspots: Pre-Auth Remote Code Execution, Arbitrary SMS & Adjacent Attacks on 5G & 4G/LTE Routers☆92Updated 2 months ago
- Phone: A Mobile Phone Forensic Framework ( Android )☆206Updated 8 months ago
- Collection of my Security Blueprints & Guides☆51Updated 2 months ago