evilsocket / rubertooth
A complete Ruby porting of the ubertooth libraries and utilities.
☆22Updated 9 years ago
Alternatives and similar repositories for rubertooth:
Users that are interested in rubertooth are comparing it to the libraries listed below
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- An attacker-oriented library for the Teensy 3.1 microcontroller.☆44Updated 10 years ago
- HARDSPLOIT GUI : The essential security auditing tool for Internet of Things devices you'll need in your toolbox☆39Updated 4 years ago
- TCP session interception and injection framework☆56Updated 14 years ago
- Password analysis software☆37Updated 9 years ago
- This device silently hunts its prey, swooping in to gather RFID cards.☆33Updated 2 years ago
- spectrum monitoring system for GSM providers☆44Updated 9 years ago
- ☆27Updated 7 years ago
- Websocket based egress tester☆20Updated 8 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 11 years ago
- A few ZigBee Tools to compliment KillerBee☆52Updated 8 years ago
- Malware analysis using Docker project☆25Updated 9 years ago
- A multi service threaded MD5 cracker☆66Updated 8 years ago
- Find useful stuff in pastebin☆23Updated 11 years ago
- Inject beef hooks into HTTP traffic and track hooked systems from cmdline☆121Updated 9 years ago
- The Dirty Secrets They Didn't Teach You In Pentesting Class☆95Updated 13 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- Parallel APK analyzer☆51Updated 8 years ago
- Python library that facilitates interfacing with BeEF via it's RESTful API☆77Updated 7 years ago
- Modification and tools for using hostapd for rogue AP attacks impersonating WPA-Enterprise networks to steal user credentials☆40Updated 6 years ago
- Android wireless karma attack detector☆66Updated 9 years ago
- µphisher spear phishing tool (reference implementation)☆39Updated 4 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Updated 10 years ago
- like hidden-tear with libsodium☆20Updated 9 years ago
- KillerZee: Tools for Attacking and Evaluating Z-Wave Networks☆54Updated 6 years ago
- everything that does not fit elsewhere☆12Updated 7 years ago
- A GUI-based USB device fuzzer☆62Updated 7 years ago
- ☆198Updated 9 years ago
- Local privilege escalation scripts and tools☆16Updated 8 years ago