hook-s3c / blueborne-scannerLinks
Bluetooth scanner for local devices that may be vulnerable to Blueborne exploit
☆160Updated 8 years ago
Alternatives and similar repositories for blueborne-scanner
Users that are interested in blueborne-scanner are comparing it to the libraries listed below
Sorting:
- Scan/Exploit Blueborne CVE-2017-0785☆31Updated 7 years ago
- Arduino Rubber Ducky Framework☆107Updated 6 years ago
- MitM pentesting opensource toolkit (scan/sniff/exploit) -- NOT SUPORTED ANYMORE --☆76Updated 9 years ago
- Purpose only! The dangers of Bluetooth implementations: Unveiling zero day vulnerabilities and security flaws in …☆283Updated 4 years ago
- POC for injecting Metasploit payloads on arbitrary APKs☆65Updated 9 years ago
- IP Cam Shell is a command line script for testing and exploiting a wide range of IP cameras as demonstrated by Craig Heffner in "Exploiti…☆145Updated 8 years ago
- Shodanwave is a tool for exploring and obtaining information from Netwave IP Camera.☆262Updated 5 years ago
- ☆58Updated 5 years ago
- Inject malicious code into *.debs☆283Updated 3 years ago
- Embed a Metasploit Payload in an Original .Apk File☆118Updated 4 years ago
- Linux tool used to extract sensitive data, inject backdoor or drop remote shells on android devices.☆108Updated 9 years ago
- Wireless mouse/keyboard attack with replay/transmit poc☆93Updated 9 years ago
- Script to generate malicious debian packages (debain trojans).☆120Updated 6 years ago
- CVE-2017-0785 BlueBorne PoC☆38Updated 8 years ago
- The router hacking repo.☆34Updated 10 years ago
- SS7 tools and scripts☆230Updated 5 years ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy☆145Updated 9 years ago
- Krack POC☆126Updated 7 years ago
- A script written lazily for generating cross-platform backdoors on the go :)☆190Updated 7 years ago
- 📡🍓🍍 Detects wireless network attacks performed by KARMA module (fake AP). Starts deauthentication attack (for fake access points)☆256Updated 7 years ago
- Terminator metasploit payload generator☆180Updated 7 years ago
- PoC tool to demonstrate vulnerabilities in wireless input devices☆86Updated 8 years ago
- Converts a USB Rubber ducky script into a Kali Nethunter friendly format for the HID attack☆143Updated 11 years ago
- An automated Wireless RogueAP MITM attack framework.☆186Updated 6 years ago
- Wifi sniffing and hijacking tool☆81Updated 11 years ago
- Bluetooth Honeypot☆264Updated 5 years ago
- My collection of metasploit auxiliary post-modules☆192Updated 6 years ago
- THIS REPO IS OBSOLETE. USE https://github.com/rapid7/metasploit-payloads INSTEAD☆92Updated 2 years ago
- Hostapd fork including Wi-Fi attacks and providing Python bindings with ctypes.☆186Updated 4 years ago
- Forced Man-In-The-Middle HTTPs-Avoiding Reverse Proxy☆62Updated 6 years ago