fO-000 / bluingLinks
An intelligence gathering tool for hacking Bluetooth
☆979Updated 2 years ago
Alternatives and similar repositories for bluing
Users that are interested in bluing are comparing it to the libraries listed below
Sorting:
- HomePwn - Swiss Army Knife for Pentesting of IoT Devices☆921Updated 3 years ago
- CamOver is a camera exploitation tool that allows to disclosure network camera admin password.☆578Updated last year
- Bluetooth hacking tools☆473Updated 2 years ago
- A Series of Baseband & LMP Exploits against Bluetooth Classic Controllers☆540Updated last year
- RomBuster is a router exploitation tool that allows to disclosure network router admin password.☆535Updated last year
- Drone pentesting framework console☆1,744Updated last year
- Automated WPA/WPA2 PSK attack tool.☆623Updated 4 years ago
- MDK4☆755Updated last year
- CamRaptor is a tool that exploits several vulnerabilities in popular DVR cameras to obtain network camera credentials.☆238Updated last year
- BlueToolkit is an extensible Bluetooth Classic vulnerability testing framework that helps uncover new and old vulnerabilities in Bluetoo…☆651Updated 5 months ago
- GsmEvil 2☆360Updated 3 years ago
- A sniffer for Bluetooth 5 and 4.x LE☆1,088Updated 4 months ago
- Drone Hacking Tool is a GUI tool that works with a USB Wifi adapter and HackRF One for hacking drones.☆669Updated 3 years ago
- Bluetooth hack, forked from https://gitlab.com/kalilinux/packages/bluesnarfer/☆247Updated 2 years ago
- A framework for pentesters that facilitates evil twin attacks as well as exploiting other wifi vulnerabilities☆338Updated last year
- Script for quick and easy DOS-attacks on bluetooth devices for pentest purposes☆664Updated 2 years ago
- Next-Gen GUI-based WiFi and Bluetooth Analyzer for Linux☆1,480Updated 2 months ago
- A Wireless (WPA/WPA2) Pentest/Cracking tool. Captures & Crack 4-way handshake and PMKID key. Also, supports a deauthentication/jammer mod…☆1,065Updated 5 years ago
- Update Version 3.1 added free SMS messaging.☆499Updated 4 years ago
- Tool for especially scanning nearby devices and execute a given command on its own system while the target device comes in range.☆380Updated 4 years ago
- Powerful framework for rogue access point attack.☆2,377Updated 2 years ago
- A collection of awesome lists for hackers, pentesters & security researchers.☆348Updated 2 years ago
- The CAN Injection Toolkit☆325Updated 9 months ago
- Devkit for building Metasploit-like consoles☆252Updated 4 months ago
- ☆432Updated 2 years ago
- PoC to record audio from a Bluetooth device☆1,561Updated last year
- Every device has a limit on the size of the L2CAP ping. If it gets an L2CAP ping packet, which is beyond the limit of the size, it will c…☆23Updated 2 weeks ago
- This program capture SMS & IMSI numbers of cellphones around you.☆258Updated 3 years ago
- All releases of the security research group (a.k.a. hackers) The Hacker's Choice☆749Updated 5 months ago
- Websploit is an advanced MITM framework.☆305Updated 8 years ago