mailinneberg / BlueBorneLinks
Purpose only! The dangers of Bluetooth implementations: Unveiling zero day vulnerabilities and security flaws in modern Bluetooth stacks.
☆284Updated 4 years ago
Alternatives and similar repositories for BlueBorne
Users that are interested in BlueBorne are comparing it to the libraries listed below
Sorting:
- PoC scripts demonstrating the BlueBorne vulnerabilities☆608Updated 4 years ago
- Blueborne CVE-2017-0785 Android information leak vulnerability☆469Updated 8 years ago
- Bluetooth scanner for local devices that may be vulnerable to Blueborne exploit☆158Updated 8 years ago
- Python script to inject existing Android applications with a Meterpreter payload.☆643Updated 2 years ago
- An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)☆337Updated last year
- Generate Payloads and Control Remote Machines. [Discontinued]☆224Updated 4 years ago
- transform your payload.exe into one fake word doc (.ppt)☆468Updated 5 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆439Updated 8 years ago
- DNS spoofer. Drops DNS responses from the router and replaces it with the spoofed DNS response☆287Updated 8 years ago
- Android APK Antivirus evasion for msfvenom generated payloads.☆199Updated 7 years ago
- Embed a Metasploit Payload in an Original .Apk File☆117Updated 4 years ago
- (deprecated) Android application vulnerability analysis and Android pentest tool☆294Updated 7 years ago
- A Phishing Dropper designed to Pentest.☆274Updated 8 years ago
- this script automatically install any package for pentest with uptodate tools , and lazy command for run the tools like lazynmap , instal…☆373Updated 8 years ago
- Wireless Hacking, WiFi Security, Vulnerability Analyzer, Pentestration☆306Updated 3 years ago
- NXcrypt - 'python backdoor' framework☆368Updated 8 years ago
- Auto Root Exploit Tool☆532Updated 2 years ago
- Trojanize your payload - WinRAR (SFX) automatization - under Linux distros☆292Updated 7 years ago
- Linux bash script automation for metasploit☆268Updated 6 years ago
- Hostapd fork including Wi-Fi attacks and providing Python bindings with ctypes.☆183Updated 4 years ago
- Find your wireless network password in Windows , Linux and Mac OS☆355Updated 5 years ago
- metasploitHelper☆251Updated 5 years ago
- Inject malicious code into *.debs☆276Updated 3 years ago
- Converts a USB Rubber ducky script into a Kali Nethunter friendly format for the HID attack☆141Updated 10 years ago
- Proof-of-concept of the KRACK attack against Linux and Android☆157Updated 7 years ago
- PwnSTAR (Pwn SofT-Ap scRipt) - for all your fake-AP needs!☆256Updated 8 years ago
- SSLStrip version to defeat HSTS☆322Updated 8 years ago
- Shodanwave is a tool for exploring and obtaining information from Netwave IP Camera.☆257Updated 5 years ago
- Armor is a simple Bash script designed to create encrypted macOS payloads capable of evading antivirus scanners.☆279Updated 2 years ago
- Android Trojan☆196Updated 10 years ago