kovmir / l2floodLinks
l2ping with threads to flood attack bluetooth devices
☆93Updated 4 months ago
Alternatives and similar repositories for l2flood
Users that are interested in l2flood are comparing it to the libraries listed below
Sorting:
- A simple script that makes possible BLE deauthentication!☆193Updated 3 years ago
- A tool which perform deauthentication attack on unpaired bluetooth devices.☆46Updated 3 months ago
- Turning smart lights into Wifi Hacking implants.☆146Updated 9 months ago
- 315Mhz jammer with Menu☆126Updated 2 years ago
- Build repo from Universal Wifi pineapple hardware cloner☆83Updated 2 years ago
- Raspberry Pi WiFi Evil Twin Captive Portal☆97Updated 4 years ago
- A dos (denial of service) attack for local networks using dead router attack (IPv6) and ARP attack (IPv4) simultaneously☆131Updated 7 months ago
- A unique, multithreaded Slow DoS exploit against web servers that use vulnerable versions of thread-based web server software (Apache 1.x…☆45Updated 4 years ago
- Bluestrike: CLI tool to hack Bluetooth devices through speaker jamming, traffic spoofing & device hijacking (In the making)☆386Updated last year
- Whenever the Raspberry Pi Device is turned on, it attempts to attack all the wifi networks within the area using wifite and then 📧 email…☆44Updated 3 years ago
- Raspberry Pi Zero 2 W Kali Linux (Pi-Tail) installation and setup☆48Updated last year
- An open-source ESP8266_Deauther with customizable Evil Twin attack, and WiFi signal strength checker, with a user-friendly web interface …☆142Updated last year
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆60Updated 3 years ago
- Simple WiFi controlled 433Mhz radio jammer based on ESP32/ESP8266 and FS1000A☆132Updated 3 months ago
- Instructions for creating the PumpkinPi a Raspberry Pi based Wireless MiTM device using the Pumkin Framework☆64Updated last year
- Pentesting Suite☆48Updated 4 months ago
- Send raw 802.11 WiFi frames using an RTL8720dn☆105Updated 7 months ago
- A simple ESP32 based WiFi detector that assists when jamming efforts may be attempted☆33Updated 2 years ago
- An evil twin attack is a spoofing cyberattack that works by tricking users into connecting to a fake Wi-Fi access point that mimics a leg…☆74Updated 3 years ago
- PiZ0mn1aTool is a compact and powerful hacking tool, crafted around the Raspberry Pi Zero 2W, paired with a Display Gaming LCD Hat.☆26Updated 2 years ago
- Turn your Rasp Zero W in a multitool for pentesting☆147Updated 2 years ago
- Evil Crow Cable Pro device☆127Updated last month
- A collection of Encoded Payloads from the Community both for Hak5 & BadUSB Devices☆71Updated last year
- This is very usefull bluetooth jammer or doser tool in kali or parrot linux...☆165Updated 6 years ago
- P4wnP1 A.L.O.A. by MaMe82 is a framework which turns a Rapsberry Pi Zero W into a flexible, low-cost platform for pentesting, red teaming…☆79Updated 3 years ago
- Compilation of HID Scripts and Payloads for P4wnP1☆27Updated 3 years ago
- Deauther Project can be used to: Disconnect Devices from Networks, and Clone Networks☆36Updated 3 years ago
- A portable ESP8266-based device for Evil Twin and deauthentication attacks with customizable phishing pages.☆141Updated 10 months ago
- Bluetooth/BLE jamming, signal inhibition, DoS and DeAuth attack.☆282Updated last month
- Transform your Raspberry-Pi into a wardriving rig. This project came off during my research on how wardriving can be done, how cheap is i…☆58Updated 2 years ago