Blueborne CVE-2017-1000251 PoC for linux machines
☆17Mar 10, 2023Updated 3 years ago
Alternatives and similar repositories for Blueborne-CVE-2017-1000251
Users that are interested in Blueborne-CVE-2017-1000251 are comparing it to the libraries listed below
Sorting:
- Writes a custom message to your master boot record, inspired by XKCD☆16Apr 9, 2015Updated 10 years ago
- Leveraging CVE-2018-19788 without root shells☆19Dec 18, 2018Updated 7 years ago
- CVE & others☆19Aug 14, 2018Updated 7 years ago
- Burp Suite plugin identifies insertion points for GWT (Google Web Toolkit) requests☆13Sep 24, 2015Updated 10 years ago
- Arduino Leonardo compatible PHUKD library☆12May 23, 2018Updated 7 years ago
- Android Mobile Application for Spy Agents in Asterisk/FreePBX/Elastix☆14Apr 19, 2014Updated 11 years ago
- Scan/Exploit Blueborne CVE-2017-0785☆31Feb 28, 2018Updated 8 years ago
- A dns server that use to hijack other dns request in a wifi network for redirect to your custem http server ..☆20Jun 25, 2015Updated 10 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆19Aug 23, 2019Updated 6 years ago
- Control the parameters of an Android system with the power of Xposed framework. 通过Xposed框架控制Android参数。☆16Mar 24, 2017Updated 8 years ago
- Aurora Remote Administration Tool☆20Apr 16, 2018Updated 7 years ago
- CVE-2018-6546-Exploit☆41Apr 15, 2018Updated 7 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆43Mar 2, 2018Updated 8 years ago
- RC7 Scripts for Roblox.☆20Dec 17, 2016Updated 9 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Jul 27, 2018Updated 7 years ago
- CryptoJoker is an open source ransomware written in C# created for education purposes only.☆22Jul 8, 2017Updated 8 years ago
- POC for CVE-2018-1273☆24Jun 5, 2018Updated 7 years ago
- A brief analysis of the BlueBorne Vulnerability Scanner app by Armis☆24Sep 14, 2017Updated 8 years ago
- A client/server style agent meant for testing connectivity to and from a machine on a network.☆20Aug 17, 2017Updated 8 years ago
- ☆30Dec 4, 2018Updated 7 years ago
- ☆161Jan 31, 2018Updated 8 years ago
- Check All APK's -- scripts for checking your phone for malware☆30Aug 8, 2017Updated 8 years ago
- Launch radare2 like a boss from pwntools in tmux☆23Aug 27, 2019Updated 6 years ago
- ☆124Oct 1, 2016Updated 9 years ago
- DefCon 26 Badge Hacking☆38Aug 16, 2018Updated 7 years ago
- Proof of Concept exploit for CVE-2017-8570☆184Jan 9, 2018Updated 8 years ago
- avarehelper☆12Aug 15, 2021Updated 4 years ago
- A HTTP bot in Java with basic commands and ability's☆10Aug 20, 2015Updated 10 years ago
- ☆12Feb 4, 2025Updated last year
- Cuda Miner for BeamHash (Equihash 150,5)☆13Jan 16, 2019Updated 7 years ago
- a python script that automates recon flow for a given target domain.☆10Apr 21, 2022Updated 3 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆84Jul 2, 2018Updated 7 years ago
- Network Assessment Assistance Framework (PenTest Toolkit).☆42Nov 18, 2019Updated 6 years ago
- Sends some one a malicious payload through smtp and starts a listener with metasploit.☆36Mar 21, 2018Updated 7 years ago
- Burp extension to specify the token value for the Authenication header while scanning.☆10Sep 18, 2018Updated 7 years ago
- Chequea si tu firewall es vulnerable a CVE-2024-21762 (RCE sin autenticación)☆15Jun 29, 2025Updated 8 months ago
- The Art of the Steal / Deal - Made in Austria - Collection of Token White Papers on the Blockchain - Incl. Scam Alert - Thanks for your m…☆10Jan 2, 2021Updated 5 years ago
- Bitcoin Hardware Wallet Interaction scripts☆11Jan 30, 2026Updated last month
- Anrodi Trojanı Başka Bir Programla Birleştir☆10Oct 30, 2016Updated 9 years ago