joswr1ght / btfind
Bluetooth Find provides a mechanism with which you can locate and track discoverable Bluetooth devices
☆25Updated 6 years ago
Alternatives and similar repositories for btfind:
Users that are interested in btfind are comparing it to the libraries listed below
- Brute force password selection for EAP-MD5 authentication exchanges☆21Updated 7 years ago
- Tools for attacking various MIFARE RFID cards☆14Updated 5 years ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 2 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Updated 7 years ago
- Open source SDR LTE software suite☆19Updated 7 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 5 years ago
- Passphrase wordlist and hashcat rules for offline cracking of long, complex passwords☆13Updated 6 years ago
- Sniffs sensitive data from interface or pcap☆14Updated 6 years ago
- ☆12Updated 2 years ago
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Updated 5 years ago
- Compilation of commands, tips and scripts that helped me throughout Vulnhub, Hackthebox, OSCP and real scenarios☆14Updated 7 years ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆68Updated last year
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Passive recon / OSINT automation script☆40Updated 6 years ago
- A while back antirez, in a post to Bugtraq, detailed a new Tcp portscan method.☆16Updated 7 years ago
- Convert Windows Netmon Monitor Mode Wireless Packet Captures to Libpcap Format☆15Updated 5 years ago
- ☆34Updated last week
- recon-ng Maltego local transform pack☆39Updated 11 years ago
- ☆21Updated last year
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Updated 4 years ago
- Malicious Link Blog☆24Updated last year
- Search Email Accounts (OWA) for Passwords, PAN numbers as well as other Keywords☆39Updated 6 years ago
- Automated install process for Phishing Frenzy☆23Updated 10 years ago
- Maltego transform for visualizing Nessus scan data☆46Updated 5 years ago
- iOS forensics utility☆12Updated 6 years ago
- ☆15Updated 8 years ago
- A IEEE 802.15.4 Wireless Intrusion Detection System, Using the KillerBee Framework☆37Updated 4 years ago
- Converts John The Ripper/Cain format hashes (singular, or in bulk) to HashCat compatible hash format.☆33Updated 5 years ago
- Patch for hostapd and wpa_supplicant to attempt to exploit heartbleed on EAP-PEAP/TLS/TTLS connections☆105Updated 10 years ago
- Basically tries lots of combinations of local and remote usernames to execute commands via RSH☆15Updated 9 years ago