hook-s3c / blueborne-scannerLinks
Bluetooth scanner for local devices that may be vulnerable to Blueborne exploit
☆154Updated 8 years ago
Alternatives and similar repositories for blueborne-scanner
Users that are interested in blueborne-scanner are comparing it to the libraries listed below
Sorting:
- Purpose only! The dangers of Bluetooth implementations: Unveiling zero day vulnerabilities and security flaws in …☆281Updated 4 years ago
- Scan/Exploit Blueborne CVE-2017-0785☆29Updated 7 years ago
- Embed a Metasploit Payload in an Original .Apk File☆116Updated 4 years ago
- Arduino Rubber Ducky Framework☆107Updated 6 years ago
- MitM pentesting opensource toolkit (scan/sniff/exploit) -- NOT SUPORTED ANYMORE --☆75Updated 8 years ago
- IP Cam Shell is a command line script for testing and exploiting a wide range of IP cameras as demonstrated by Craig Heffner in "Exploiti…☆143Updated 8 years ago
- Linux tool used to extract sensitive data, inject backdoor or drop remote shells on android devices.☆107Updated 9 years ago
- POC for injecting Metasploit payloads on arbitrary APKs☆65Updated 8 years ago
- An automated Wireless RogueAP MITM attack framework.☆186Updated 6 years ago
- We Use Github Extensively and openly. So it becomes dificult to track what's what and what's where. This repository is a master repo to H…☆138Updated 2 years ago
- Bluetooth Honeypot☆261Updated 4 years ago
- Wireless Hacking, WiFi Security, Vulnerability Analyzer, Pentestration☆302Updated 3 years ago
- Shodanwave is a tool for exploring and obtaining information from Netwave IP Camera.☆257Updated 4 years ago
- A script written lazily for generating cross-platform backdoors on the go :)☆190Updated 7 years ago
- Krack POC☆125Updated 7 years ago
- Terminator metasploit payload generator☆180Updated 7 years ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy☆145Updated 8 years ago
- SS7 tools and scripts☆222Updated 5 years ago
- Inject malicious code into *.debs☆276Updated 3 years ago
- Hostapd fork including Wi-Fi attacks and providing Python bindings with ctypes.☆183Updated 4 years ago
- (deprecated) Android application vulnerability analysis and Android pentest tool☆293Updated 6 years ago
- Converts a USB Rubber ducky script into a Kali Nethunter friendly format for the HID attack☆141Updated 10 years ago
- ☆58Updated 5 years ago
- Blueborne CVE-2017-0781 Android heap overflow vulnerability☆140Updated 4 years ago
- Forced Man-In-The-Middle HTTPs-Avoiding Reverse Proxy☆63Updated 6 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆223Updated 4 years ago
- Wireless mouse/keyboard attack with replay/transmit poc☆90Updated 9 years ago
- Exploit the hack for IOS 11.1.2 and earlier to collect leaked information.☆86Updated 7 years ago
- Proof-of-concept of the KRACK attack against Linux and Android☆155Updated 7 years ago
- Python plugin for Kismet to perform deauthentication to collect WPA2 handshakes☆99Updated 8 years ago