mailinneberg / BlueBorneLinks
Purpose only! The dangers of Bluetooth implementations: Unveiling zero day vulnerabilities and security flaws in modern Bluetooth stacks.
☆280Updated 4 years ago
Alternatives and similar repositories for BlueBorne
Users that are interested in BlueBorne are comparing it to the libraries listed below
Sorting:
- Blueborne CVE-2017-0785 Android information leak vulnerability☆466Updated 8 years ago
- PoC scripts demonstrating the BlueBorne vulnerabilities☆604Updated 4 years ago
- Bluetooth scanner for local devices that may be vulnerable to Blueborne exploit☆154Updated 8 years ago
- Python script to inject existing Android applications with a Meterpreter payload.☆644Updated 2 years ago
- (deprecated) Android application vulnerability analysis and Android pentest tool☆291Updated 6 years ago
- Android APK Antivirus evasion for msfvenom generated payloads.☆196Updated 7 years ago
- transform your payload.exe into one fake word doc (.ppt)☆467Updated 5 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆441Updated 8 years ago
- SS7 Assessment Tool☆251Updated 2 years ago
- Wireless Hacking, WiFi Security, Vulnerability Analyzer, Pentestration☆295Updated 3 years ago
- An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)☆333Updated last year
- Embed a Metasploit Payload in an Original .Apk File☆117Updated 4 years ago
- SSLStrip version to defeat HSTS☆319Updated 8 years ago
- Hostapd fork including Wi-Fi attacks and providing Python bindings with ctypes.☆185Updated 4 years ago
- Proof-of-concept of the KRACK attack against Linux and Android☆154Updated 7 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆222Updated 4 years ago
- A Phishing Dropper designed to Pentest.☆274Updated 8 years ago
- Blueborne CVE-2017-0781 Android heap overflow vulnerability☆140Updated 4 years ago
- intercepting kali router☆441Updated 8 years ago
- DNS spoofer. Drops DNS responses from the router and replaces it with the spoofed DNS response☆285Updated 8 years ago
- Converts a USB Rubber ducky script into a Kali Nethunter friendly format for the HID attack☆139Updated 10 years ago
- PwnSTAR (Pwn SofT-Ap scRipt) - for all your fake-AP needs!☆255Updated 7 years ago
- metasploitHelper☆250Updated 5 years ago
- BadUSB 2.0 USB-HID MiTM POC☆285Updated 9 years ago
- This is a POC to show it is possible to capture enough of a handshake with a user from a fake AP to crack a WPA2 network without knowing …☆589Updated 3 years ago
- Shodanwave is a tool for exploring and obtaining information from Netwave IP Camera.☆256Updated 4 years ago
- SS7 tools and scripts☆219Updated 5 years ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing☆357Updated 3 weeks ago
- Car Backdoor Maker☆220Updated 6 years ago
- WPS hacking scripts☆280Updated last year