evilsocket / bleah
This repository is DEPRECATED, please use bettercap as this tool has been ported to its BLE modules.
☆1,096Updated 6 years ago
Alternatives and similar repositories for bleah:
Users that are interested in bleah are comparing it to the libraries listed below
- A framework for wireless pentesting.☆1,205Updated 4 years ago
- SSH man-in-the-middle tool☆1,657Updated 3 years ago
- A wanna be swiss army knife for data encryption, exfiltration and covert communication.☆538Updated 2 years ago
- Man in the Middle analysis tool for Bluetooth.☆519Updated 5 years ago
- A Node.js package for BLE (Bluetooth Low Energy) security assessment using Man-in-the-Middle and other attacks☆744Updated 3 years ago
- ☆1,331Updated last year
- 📡 A python program to create a fake AP and sniff data.☆1,668Updated 5 years ago
- A Linux or OSX tool that uses psutil to monitor devices while your computer is locked. In the case it detects someone plugging in or unpl…☆580Updated 7 years ago
- WarBerryPi - Tactical Exploitation☆2,223Updated 5 years ago
- *DEPRECATED* mana toolkit for wifi rogue AP attacks and MitM☆1,092Updated 6 years ago
- BtleJuice Bluetooth Smart (LE) Man-in-the-Middle framework☆787Updated 6 years ago
- intercepting kali router☆439Updated 7 years ago
- powerful auto-backdooring utility☆746Updated 7 years ago
- A powerful and extensible wireless drop box☆266Updated 6 years ago
- Crack and decrypt BLE encryption☆889Updated 3 years ago
- ☠ Man-in-the-middle wireless access point inside a docker container 🐳☆449Updated 7 years ago
- A framework for Backdoor development!☆437Updated 7 years ago
- Kautilya - Tool for easy use of Human Interface Devices for offensive security and penetration testing.☆859Updated 7 years ago
- Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.☆1,310Updated 3 years ago
- Blueborne CVE-2017-0785 Android information leak vulnerability☆465Updated 7 years ago
- Patch Binaries via MITM: BackdoorFactory + mitmProxy.☆998Updated 3 years ago
- A Bluetooth low energy capture the flag☆693Updated 8 months ago
- A manager for your secrets.☆944Updated 9 months ago
- This is a POC to show it is possible to capture enough of a handshake with a user from a fake AP to crack a WPA2 network without knowing …☆582Updated 3 years ago
- A database of common, interesting or useful commands, in one handy referable form☆747Updated last year
- Universal Serial aBUSe is a project to demonstrate the risks of hardware bypasses of software security by Rogan Dawes at SensePost.☆497Updated 7 years ago
- Various PoCs☆491Updated 5 years ago
- A web front-end for password cracking and analytics☆625Updated 3 years ago
- Modern tactical exploitation toolkit.☆846Updated 9 months ago
- This repository contains some bettercap transparent proxy example modules.☆283Updated 7 years ago