evilsocket / bleahLinks
This repository is DEPRECATED, please use bettercap as this tool has been ported to its BLE modules.
☆1,095Updated 6 years ago
Alternatives and similar repositories for bleah
Users that are interested in bleah are comparing it to the libraries listed below
Sorting:
- A framework for wireless pentesting.☆1,211Updated 4 years ago
- A Linux or OSX tool that uses psutil to monitor devices while your computer is locked. In the case it detects someone plugging in or unpl…☆581Updated 7 years ago
- Man in the Middle analysis tool for Bluetooth.☆521Updated 5 years ago
- WarBerryPi - Tactical Exploitation☆2,220Updated 5 years ago
- A wanna be swiss army knife for data encryption, exfiltration and covert communication.☆539Updated 3 years ago
- Blueborne CVE-2017-0785 Android information leak vulnerability☆465Updated 7 years ago
- A web front-end for password cracking and analytics☆624Updated 3 years ago
- SSH man-in-the-middle tool☆1,664Updated 3 years ago
- intercepting kali router☆439Updated 7 years ago
- 📡 A python program to create a fake AP and sniff data.☆1,675Updated 5 years ago
- PoC scripts demonstrating the BlueBorne vulnerabilities☆600Updated 4 years ago
- Seamlessly spy on SSH session like it is your tty☆349Updated 7 years ago
- A manager for your secrets.☆948Updated 11 months ago
- Various PoCs☆491Updated 5 years ago
- This repository contains some bettercap transparent proxy example modules.☆283Updated 7 years ago
- A powerful and extensible wireless drop box☆266Updated 6 years ago
- LLDB MCP Integration + other helpful commands☆728Updated 2 months ago
- powerful auto-backdooring utility☆747Updated 7 years ago
- Don't Skype & Type! Keyboard acoustic eavesdropping tool.☆319Updated 6 years ago
- ☆1,328Updated 2 years ago
- wide range mass audit toolkit☆1,026Updated 6 years ago
- 🕷 A lightning fast multithreaded network scanner framework with modules.☆324Updated 5 years ago
- Command line utility for searching and downloading exploits☆1,775Updated last year
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing☆357Updated 8 months ago
- ☠ Man-in-the-middle wireless access point inside a docker container 🐳☆451Updated 7 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆372Updated 2 years ago
- Post-exploitation framework (and an interactive shell) developed in Bash shell scripting☆312Updated 8 years ago
- Crack and decrypt BLE encryption☆902Updated 3 years ago
- *DEPRECATED* mana toolkit for wifi rogue AP attacks and MitM☆1,095Updated 6 years ago
- XRay is a tool for recon, mapping and OSINT gathering from public networks.☆2,261Updated 11 months ago