hook-s3c / blueborne-scanner
Bluetooth scanner for local devices that may be vulnerable to Blueborne exploit
☆152Updated 7 years ago
Alternatives and similar repositories for blueborne-scanner:
Users that are interested in blueborne-scanner are comparing it to the libraries listed below
- Scan/Exploit Blueborne CVE-2017-0785☆30Updated 6 years ago
- Embed a Metasploit Payload in an Original .Apk File☆116Updated 3 years ago
- Purpose only! The dangers of Bluetooth implementations: Unveiling zero day vulnerabilities and security flaws in …☆273Updated 3 years ago
- An automated Wireless RogueAP MITM attack framework.☆181Updated 5 years ago
- PoC scripts demonstrating the BlueBorne vulnerabilities☆593Updated 3 years ago
- BlueMaho is GUI-shell (interface) for suite of tools for testing security of bluetooth devices. It is freeware, opensource, written on py…☆56Updated 8 years ago
- My collection of metasploit auxiliary post-modules☆190Updated 5 years ago
- Bluetooth Honeypot☆247Updated 4 years ago
- MitM pentesting opensource toolkit (scan/sniff/exploit) -- NOT SUPORTED ANYMORE --☆76Updated 8 years ago
- THIS REPO IS OBSOLETE. USE https://github.com/rapid7/metasploit-payloads INSTEAD☆88Updated last year
- Shodanwave is a tool for exploring and obtaining information from Netwave IP Camera.☆250Updated 4 years ago
- Multiplatform payload dropper☆264Updated 3 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆225Updated 3 years ago
- IP Cam Shell is a command line script for testing and exploiting a wide range of IP cameras as demonstrated by Craig Heffner in "Exploiti…☆135Updated 7 years ago
- Android APK Antivirus evasion for msfvenom generated payloads.☆188Updated 6 years ago
- (deprecated) Android application vulnerability analysis and Android pentest tool☆287Updated 6 years ago
- 📡🍓🍍 Detects wireless network attacks performed by KARMA module (fake AP). Starts deauthentication attack (for fake access points)☆251Updated 6 years ago
- SS7 tools and scripts☆205Updated 4 years ago
- Bluetooth hacking tools☆412Updated last year
- Blueborne CVE-2017-0785 Android information leak vulnerability☆466Updated 7 years ago
- WIreless Hacking Tools☆162Updated 11 years ago
- GSM Assessment Toolkit - A security evaluation framework for GSM networks☆73Updated 7 years ago
- A Phishing Dropper designed to Pentest.☆270Updated 7 years ago
- Hostapd fork including Wi-Fi attacks and providing Python bindings with ctypes.☆177Updated 3 years ago
- Autoexploitation of some of the most common vulnerabilities in wild☆122Updated 6 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆437Updated 7 years ago
- Terminator metasploit payload generator☆177Updated 6 years ago
- Arduino Rubber Ducky Framework☆106Updated 5 years ago
- Wireless mouse/keyboard attack with replay/transmit poc☆86Updated 8 years ago
- Armor is a simple Bash script designed to create encrypted macOS payloads capable of evading antivirus scanners.☆280Updated last year