kovmir / l2floodLinks
l2ping with threads to flood attack bluetooth devices
☆80Updated last month
Alternatives and similar repositories for l2flood
Users that are interested in l2flood are comparing it to the libraries listed below
Sorting:
- A simple script that makes possible BLE deauthentication!☆190Updated 2 years ago
- A simple ESP32 based WiFi detector that assists when jamming efforts may be attempted☆30Updated last year
- 315Mhz jammer with Menu☆119Updated last year
- Bluetooth jamming device. long-range version is under testing☆173Updated 10 months ago
- Send raw 802.11 WiFi frames using an RTL8720dn☆88Updated 4 months ago
- Instructions for creating the PumpkinPi a Raspberry Pi based Wireless MiTM device using the Pumkin Framework☆62Updated 11 months ago
- Build repo from Universal Wifi pineapple hardware cloner☆80Updated last year
- A suite of WiFi/Bluetooth offensive and defensive tools for the ESP32 and ESP8266☆169Updated 4 years ago
- A portable ESP8266-based device for Evil Twin and deauthentication attacks with customizable phishing pages.☆142Updated 7 months ago
- Bluestrike: CLI tool to hack Bluetooth devices through speaker jamming, traffic spoofing & device hijacking (In the making)☆371Updated last year
- Simple WiFi controlled 433Mhz radio jammer based on ESP32/ESP8266 and FS1000A☆112Updated last week
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆46Updated 3 years ago
- An evil twin attack is a spoofing cyberattack that works by tricking users into connecting to a fake Wi-Fi access point that mimics a leg…☆71Updated 3 years ago
- Raspberry Pi WiFi Evil Twin Captive Portal☆95Updated 3 years ago
- Emensta'sToolKit is a multifunctinal Kit with tools for checking, and doing several things with a network and it's devices. The tool will…☆44Updated last year
- An open-source ESP8266_Deauther with customizable Evil Twin attack, and WiFi signal strength checker, with a user-friendly web interface …☆121Updated 10 months ago
- A cybersecurity tool for RF scanning, copying, and replaying signals☆146Updated last year
- Transform your Raspberry-Pi into a wardriving rig. This project came off during my research on how wardriving can be done, how cheap is i…☆55Updated 2 years ago
- Simplest ultrasonic ANTISPY voice recording jammer based on ATTINY13 / ATTINY85/45/25 / ARDUINO with PAM8403 / TPA3116D2 module driving …☆276Updated 3 weeks ago
- A tool which perform deauthentication attack on unpaired bluetooth devices.☆43Updated this week
- BLE jammer using NRF240L+ modules and Maple Mini (STM32)☆222Updated 4 years ago
- ⚡ Perform Evil Twin Attack Using NodeMCU Board☆46Updated last year
- Frieren is a micro-framework designed for use in routers and Single Board Computers (SBCs). This framework is built to be lightweight, ef…☆141Updated 2 months ago
- A unique, multithreaded Slow DoS exploit against web servers that use vulnerable versions of thread-based web server software (Apache 1.x…☆40Updated 3 years ago
- WiFi keylogger with Micro SD slot, based on the Atmega32U4 microcontroller and the ESP32-PICO module☆236Updated 4 months ago
- 🔑This is a small project about an RF module for an Arduino. This module can transmit at 433 MHz, which can be used to jam or disable a c…☆47Updated 2 years ago
- ESP32 Network Toolbox Scripts☆31Updated 11 months ago
- Portable RF device based on CC1101 & ESP8266 D1 Mini. Allows for RF jamming, simple replay attack and more..☆145Updated 8 months ago
- Raspberry Pi Pico BadUSB is a simple implementation of the BadUSB idea using DuckyScript-alike syntax.☆140Updated 11 months ago
- RollJam is a method of capturing a vehicle's rolling code key fob transmission by simultaneously intercepting the transmission and jammin…☆160Updated 3 years ago