kovmir / l2floodLinks
l2ping with threads to flood attack bluetooth devices
☆81Updated last month
Alternatives and similar repositories for l2flood
Users that are interested in l2flood are comparing it to the libraries listed below
Sorting:
- A simple script that makes possible BLE deauthentication!☆192Updated 2 years ago
- 315Mhz jammer with Menu☆119Updated last year
- A tool which perform deauthentication attack on unpaired bluetooth devices.☆43Updated 3 weeks ago
- A simple ESP32 based WiFi detector that assists when jamming efforts may be attempted☆30Updated 2 years ago
- Pentesting Suite☆38Updated 2 months ago
- Instructions for creating the PumpkinPi a Raspberry Pi based Wireless MiTM device using the Pumkin Framework☆63Updated last year
- Send raw 802.11 WiFi frames using an RTL8720dn☆93Updated 5 months ago
- This is very usefull bluetooth jammer or doser tool in kali or parrot linux...☆161Updated 6 years ago
- Build repo from Universal Wifi pineapple hardware cloner☆80Updated last year
- BLE jammer using NRF240L+ modules and Maple Mini (STM32)☆221Updated 4 years ago
- A portable ESP8266-based device for Evil Twin and deauthentication attacks with customizable phishing pages.☆142Updated 8 months ago
- Very simple 433MHz (EU/ASIA) 315 MHz (US) RF jammer for keyless cars theft prevention☆183Updated last year
- A cybersecurity tool for RF scanning, copying, and replaying signals☆148Updated last year
- Script with several tools to brute force garages, hack radio stations and capture and analyze radio signals with Raspberry Pi☆187Updated 11 months ago
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆53Updated 3 years ago
- An open-source ESP8266_Deauther with customizable Evil Twin attack, and WiFi signal strength checker, with a user-friendly web interface …☆129Updated 11 months ago
- RollJam is a method of capturing a vehicle's rolling code key fob transmission by simultaneously intercepting the transmission and jammin…☆165Updated 3 years ago
- Bluestrike: CLI tool to hack Bluetooth devices through speaker jamming, traffic spoofing & device hijacking (In the making)☆380Updated last year
- Simple WiFi controlled 433Mhz radio jammer based on ESP32/ESP8266 and FS1000A☆121Updated 3 weeks ago
- Turning smart lights into Wifi Hacking implants.☆131Updated 7 months ago
- Deauther Project can be used to: Disconnect Devices from Networks, and Clone Networks☆34Updated 3 years ago
- ESP32 Network Toolbox Scripts☆31Updated 11 months ago
- Bluetooth/BLE jamming, signal inhibition, DoS and DeAuth attack.☆190Updated 3 months ago
- A dos (denial of service) attack for local networks using dead router attack (IPv6) and ARP attack (IPv4) simultaneously☆121Updated 4 months ago
- Raspberry Pi WiFi Evil Twin Captive Portal☆95Updated 3 years ago
- Whenever the Raspberry Pi Device is turned on, it attempts to attack all the wifi networks within the area using wifite and then 📧 email…