mailinneberg / BlueBorne
Purpose only! The dangers of Bluetooth implementations: Unveiling zero day vulnerabilities and security flaws in modern Bluetooth stacks.
☆274Updated 3 years ago
Alternatives and similar repositories for BlueBorne:
Users that are interested in BlueBorne are comparing it to the libraries listed below
- Blueborne CVE-2017-0785 Android information leak vulnerability☆466Updated 7 years ago
- PoC scripts demonstrating the BlueBorne vulnerabilities☆593Updated 3 years ago
- Bluetooth scanner for local devices that may be vulnerable to Blueborne exploit☆152Updated 7 years ago
- An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)☆332Updated 7 months ago
- transform your payload.exe into one fake word doc (.ppt)☆464Updated 5 years ago
- Python script to inject existing Android applications with a Meterpreter payload.☆642Updated last year
- (deprecated) Android application vulnerability analysis and Android pentest tool☆286Updated 6 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆437Updated 7 years ago
- Android APK Antivirus evasion for msfvenom generated payloads.☆188Updated 6 years ago
- NXcrypt - 'python backdoor' framework☆364Updated 7 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆223Updated 3 years ago
- Trojanize your payload - WinRAR (SFX) automatization - under Linux distros☆288Updated 7 years ago
- A Phishing Dropper designed to Pentest.☆269Updated 7 years ago
- Multiplatform payload dropper☆268Updated 3 years ago
- HERCULES is a special payload generator that can bypass antivirus softwares.☆600Updated 3 years ago
- Wireless Hacking, WiFi Security, Vulnerability Analyzer, Pentestration☆285Updated 2 years ago
- Auto Root Exploit Tool☆531Updated last year
- Remot3d: is a simple tool created for large pentesters as well as just for the pleasure of defacers to control server by backdoors☆282Updated 4 years ago
- Linux bash script automation for metasploit☆261Updated 5 years ago
- WPS hacking scripts☆269Updated last year
- My collection of metasploit auxiliary post-modules☆190Updated 5 years ago
- Inject malicious code into *.debs☆273Updated 2 years ago
- Pythonic ransomware proof of concept.☆216Updated 4 years ago
- A fully featured Windows backdoor that uses Gmail as a C&C server☆497Updated 5 years ago
- Git all your favorite tools in one click☆263Updated 3 years ago
- Chromebackdoor is a PoC of pentest tool, this tool use a MITB technique for generate a windows executable ".exe" after launch run a malic…☆507Updated 8 years ago
- Proof-of-concept of the KRACK attack against Linux and Android☆154Updated 7 years ago
- Armor is a simple Bash script designed to create encrypted macOS payloads capable of evading antivirus scanners.☆280Updated last year
- Bluetooth Honeypot☆251Updated 4 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,399Updated 6 years ago