mailinneberg / BlueBorneView external linksLinks
Purpose only! The dangers of Bluetooth implementations: Unveiling zero day vulnerabilities and security flaws in modern Bluetooth stacks.
☆283Aug 23, 2021Updated 4 years ago
Alternatives and similar repositories for BlueBorne
Users that are interested in BlueBorne are comparing it to the libraries listed below
Sorting:
- Blueborne CVE-2017-0785 Android information leak vulnerability☆472Sep 23, 2017Updated 8 years ago
- PoC scripts demonstrating the BlueBorne vulnerabilities☆610May 17, 2021Updated 4 years ago
- Bluetooth scanner for local devices that may be vulnerable to Blueborne exploit☆160Sep 18, 2017Updated 8 years ago
- The dangers of Bluetooth implementations: Unveiling zero day vulnerabilities and security flaws in modern Bluetooth stacks.☆36Sep 30, 2024Updated last year
- A brief analysis of the BlueBorne Vulnerability Scanner app by Armis☆24Sep 14, 2017Updated 8 years ago
- ☆161Jan 31, 2018Updated 8 years ago
- Scan/Exploit Blueborne CVE-2017-0785☆31Feb 28, 2018Updated 7 years ago
- CVE-2017-0785 BlueBorne PoC☆38Sep 22, 2017Updated 8 years ago
- ☆13Jul 14, 2020Updated 5 years ago
- ☆124Oct 1, 2016Updated 9 years ago
- Tool to identify all domains contained in an IP anonymously☆15Jun 4, 2017Updated 8 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆95Sep 19, 2017Updated 8 years ago
- This script is used for extracting DDE in docx and xlsx☆12Dec 8, 2017Updated 8 years ago
- ⛷ A collection of hacker scripts.☆28Jan 24, 2017Updated 9 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆291May 14, 2019Updated 6 years ago
- Blueborne CVE-2017-0781 Android heap overflow vulnerability☆143Jul 29, 2021Updated 4 years ago
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆730Nov 19, 2017Updated 8 years ago
- Python script for trying default passwords for some TP-Link Hotspots☆35Apr 29, 2021Updated 4 years ago
- Exploits for CVE-2017-6008, a kernel pool buffer overflow leading to privilege escalation.☆120Nov 6, 2024Updated last year
- ☆3,487Dec 25, 2024Updated last year
- Various Wireless Driver patches☆34Apr 24, 2019Updated 6 years ago
- Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆314Sep 10, 2018Updated 7 years ago
- Mal Tindex is an Open Source tool for indexing binaries and help attributing malware campaigns☆67Jun 26, 2017Updated 8 years ago
- Encrypted exploit delivery for the masses☆270Sep 25, 2019Updated 6 years ago
- BLEBoy is a training tool to teach users about BLE security by providing a single BLE peripheral that can be used to experiment with each…☆46Oct 25, 2019Updated 6 years ago
- Some scripts and exploits☆147Jul 9, 2018Updated 7 years ago
- Android import hook library☆21Jan 21, 2014Updated 12 years ago
- Malware detection using learning and information retrieval for Android☆74Aug 11, 2020Updated 5 years ago
- Inject malicious code into *.debs☆283Apr 26, 2022Updated 3 years ago
- POC: Heap buffer overflow in the networking code in the XNU operating system kernel☆14Feb 25, 2024Updated last year
- Multiplatform payload dropper☆281Aug 17, 2021Updated 4 years ago
- Hardcore corruption of my execve() vulnerability in WSL☆217Feb 2, 2018Updated 8 years ago
- This repository is DEPRECATED, please use bettercap as this tool has been ported to its BLE modules.☆1,092Feb 19, 2019Updated 6 years ago
- Running CVE-2017-8759 exploit sample.☆257Jan 23, 2020Updated 6 years ago
- This tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team memb…☆221Aug 4, 2018Updated 7 years ago
- Random stuff☆16Jun 28, 2018Updated 7 years ago
- Zyklon H.T.T.P Remote Administration Tool - Control Panel leaked☆16Mar 22, 2017Updated 8 years ago
- ☆163Oct 2, 2025Updated 4 months ago
- Car Backdoor Maker☆220Oct 1, 2018Updated 7 years ago