hook-s3c / blueborne-scannerLinks
Bluetooth scanner for local devices that may be vulnerable to Blueborne exploit
☆155Updated 8 years ago
Alternatives and similar repositories for blueborne-scanner
Users that are interested in blueborne-scanner are comparing it to the libraries listed below
Sorting:
- Scan/Exploit Blueborne CVE-2017-0785☆30Updated 7 years ago
- Purpose only! The dangers of Bluetooth implementations: Unveiling zero day vulnerabilities and security flaws in …☆283Updated 4 years ago
- MitM pentesting opensource toolkit (scan/sniff/exploit) -- NOT SUPORTED ANYMORE --☆75Updated 8 years ago
- Linux tool used to extract sensitive data, inject backdoor or drop remote shells on android devices.☆109Updated 9 years ago
- Embed a Metasploit Payload in an Original .Apk File☆117Updated 4 years ago
- An automated Wireless RogueAP MITM attack framework.☆186Updated 6 years ago
- IP Cam Shell is a command line script for testing and exploiting a wide range of IP cameras as demonstrated by Craig Heffner in "Exploiti…☆142Updated 8 years ago
- Converts a USB Rubber ducky script into a Kali Nethunter friendly format for the HID attack☆141Updated 10 years ago
- Arduino Rubber Ducky Framework☆107Updated 6 years ago
- Bluetooth Honeypot☆263Updated 4 years ago
- ☆58Updated 5 years ago
- Wifi sniffing and hijacking tool☆80Updated 11 years ago
- POC for injecting Metasploit payloads on arbitrary APKs☆65Updated 8 years ago
- The router hacking repo.☆33Updated 10 years ago
- We Use Github Extensively and openly. So it becomes dificult to track what's what and what's where. This repository is a master repo to H…☆138Updated 2 years ago
- Wireless Hacking, WiFi Security, Vulnerability Analyzer, Pentestration☆305Updated 3 years ago
- Inject malicious code into *.debs☆276Updated 3 years ago
- SS7 tools and scripts☆223Updated 5 years ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy☆145Updated 8 years ago
- CVE-2017-0785 BlueBorne PoC☆40Updated 8 years ago
- (deprecated) Android application vulnerability analysis and Android pentest tool☆294Updated 7 years ago
- 📡🍓🍍 Detects wireless network attacks performed by KARMA module (fake AP). Starts deauthentication attack (for fake access points)☆256Updated 7 years ago
- Shodanwave is a tool for exploring and obtaining information from Netwave IP Camera.☆257Updated 5 years ago
- Armor is a simple Bash script designed to create encrypted macOS payloads capable of evading antivirus scanners.☆278Updated 2 years ago
- Forced Man-In-The-Middle HTTPs-Avoiding Reverse Proxy☆63Updated 6 years ago
- A script written lazily for generating cross-platform backdoors on the go :)☆190Updated 7 years ago
- 📡🔍Searches for wifi-pineapple traces and calculate wireless network security score 🍍☆159Updated 5 years ago
- Terminator metasploit payload generator☆180Updated 7 years ago
- Python plugin for Kismet to perform deauthentication to collect WPA2 handshakes☆100Updated 8 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆223Updated 4 years ago