hayzamjs / Blueborne-CVE-2017-1000251View external linksLinks
Blueborne CVE-2017-1000251 PoC for linux machines
☆17Mar 10, 2023Updated 2 years ago
Alternatives and similar repositories for Blueborne-CVE-2017-1000251
Users that are interested in Blueborne-CVE-2017-1000251 are comparing it to the libraries listed below
Sorting:
- Leveraging CVE-2018-19788 without root shells☆19Dec 18, 2018Updated 7 years ago
- CVE & others☆19Aug 14, 2018Updated 7 years ago
- Burp Suite plugin identifies insertion points for GWT (Google Web Toolkit) requests☆13Sep 24, 2015Updated 10 years ago
- Arduino Leonardo compatible PHUKD library☆13May 23, 2018Updated 7 years ago
- Android Mobile Application for Spy Agents in Asterisk/FreePBX/Elastix☆15Apr 19, 2014Updated 11 years ago
- Scan/Exploit Blueborne CVE-2017-0785☆31Feb 28, 2018Updated 7 years ago
- A dns server that use to hijack other dns request in a wifi network for redirect to your custem http server ..☆19Jun 25, 2015Updated 10 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆19Aug 23, 2019Updated 6 years ago
- Control the parameters of an Android system with the power of Xposed framework. 通过Xposed框架控制Android参数。☆16Mar 24, 2017Updated 8 years ago
- CVE-2018-6546-Exploit☆41Apr 15, 2018Updated 7 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆43Mar 2, 2018Updated 7 years ago
- A fully public exploit of the CVE-2020-0022 BlueFrag Android RCE Vulnerability (tested on Pixel 3 XL)☆19Nov 21, 2023Updated 2 years ago
- RC7 Scripts for Roblox.☆20Dec 17, 2016Updated 9 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Jul 27, 2018Updated 7 years ago
- CryptoJoker is an open source ransomware written in C# created for education purposes only.☆22Jul 8, 2017Updated 8 years ago
- POC for CVE-2018-1273☆24Jun 5, 2018Updated 7 years ago
- ☆22Mar 27, 2019Updated 6 years ago
- A brief analysis of the BlueBorne Vulnerability Scanner app by Armis☆24Sep 14, 2017Updated 8 years ago
- A client/server style agent meant for testing connectivity to and from a machine on a network.☆20Aug 17, 2017Updated 8 years ago
- ☆30Dec 4, 2018Updated 7 years ago
- A PoC implementation of the meltdown attack described in https://meltdownattack.com/meltdown.pdf☆134Jan 9, 2018Updated 8 years ago
- Check All APK's -- scripts for checking your phone for malware☆30Aug 8, 2017Updated 8 years ago
- ☆124Oct 1, 2016Updated 9 years ago
- Launch radare2 like a boss from pwntools in tmux☆23Aug 27, 2019Updated 6 years ago
- Exploitkit☆187Dec 10, 2016Updated 9 years ago
- Proof of Concept exploit for CVE-2017-8570☆185Jan 9, 2018Updated 8 years ago
- Webshell Jumping Edition☆30May 9, 2017Updated 8 years ago
- ☆12Feb 4, 2025Updated last year
- Cuda Miner for BeamHash (Equihash 150,5)☆13Jan 16, 2019Updated 7 years ago
- TLS scanning component of OWASP PurpleTeam☆11Feb 8, 2023Updated 3 years ago
- avarehelper☆12Aug 15, 2021Updated 4 years ago
- The Python Password-Protected Obfuscator☆33Jul 7, 2019Updated 6 years ago
- A HTTP bot in Java with basic commands and ability's☆10Aug 20, 2015Updated 10 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆84Jul 2, 2018Updated 7 years ago
- Network Assessment Assistance Framework (PenTest Toolkit).☆42Nov 18, 2019Updated 6 years ago
- Sends some one a malicious payload through smtp and starts a listener with metasploit.☆36Mar 21, 2018Updated 7 years ago
- Repository of now harmless TREZOR security exploits☆11Jun 14, 2015Updated 10 years ago
- node.js web scraper for roblox.com☆13Sep 17, 2014Updated 11 years ago
- Chequea si tu firewall es vulnerable a CVE-2024-21762 (RCE sin autenticación)☆15Jun 29, 2025Updated 7 months ago