evilsocket / bleahLinks
This repository is DEPRECATED, please use bettercap as this tool has been ported to its BLE modules.
☆1,092Updated 6 years ago
Alternatives and similar repositories for bleah
Users that are interested in bleah are comparing it to the libraries listed below
Sorting:
- A framework for wireless pentesting.☆1,220Updated 5 years ago
- A Linux or OSX tool that uses psutil to monitor devices while your computer is locked. In the case it detects someone plugging in or unpl…☆584Updated 8 years ago
- Man in the Middle analysis tool for Bluetooth.☆531Updated 5 years ago
- Blueborne CVE-2017-0785 Android information leak vulnerability☆469Updated 8 years ago
- ☠ Man-in-the-middle wireless access point inside a docker container 🐳☆451Updated 7 years ago
- A wanna be swiss army knife for data encryption, exfiltration and covert communication.☆539Updated 3 years ago
- *DEPRECATED* mana toolkit for wifi rogue AP attacks and MitM☆1,100Updated 7 years ago
- 📡 A python program to create a fake AP and sniff data.☆1,685Updated 6 years ago
- A web front-end for password cracking and analytics☆622Updated 3 years ago
- intercepting kali router☆446Updated 8 years ago
- BtleJuice Bluetooth Smart (LE) Man-in-the-Middle framework☆823Updated 7 years ago
- Salamandra is a tool to find spy microphones that use radio freq to transmit. It uses SDR.☆839Updated 4 years ago
- This is a POC to show it is possible to capture enough of a handshake with a user from a fake AP to crack a WPA2 network without knowing …☆591Updated 3 years ago
- powerful auto-backdooring utility☆751Updated 7 years ago
- Vendor Response Matrix for KRACK WPA2 (Key Reinstallation Attack)☆753Updated 7 years ago
- ☆1,330Updated 2 years ago
- Don't Skype & Type! Keyboard acoustic eavesdropping tool.☆317Updated 6 years ago
- Bluetooth Low Energy Swiss-army knife☆2,051Updated last year
- SSH man-in-the-middle tool☆1,725Updated 4 years ago
- A Node.js package for BLE (Bluetooth Low Energy) security assessment using Man-in-the-Middle and other attacks☆794Updated 3 years ago
- Seamlessly spy on SSH session like it is your tty☆349Updated 8 years ago
- A Software Defined Radio Attack Tool☆542Updated 10 months ago
- ☆352Updated 4 years ago
- WarBerryPi - Tactical Exploitation☆2,225Updated 6 years ago
- This repository contains some bettercap transparent proxy example modules.☆281Updated 7 years ago
- ☆479Updated last month
- Command line utility for searching and downloading exploits☆1,786Updated 2 months ago
- Universal Serial aBUSe is a project to demonstrate the risks of hardware bypasses of software security by Rogan Dawes at SensePost.☆499Updated 8 years ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing☆360Updated 2 months ago
- A framework for identifying and launching exploits against internal network hosts. Works via WebRTC IP enumeration combined with WebSocke…☆550Updated 10 years ago