mailinneberg / BlueBorne
Purpose only! The dangers of Bluetooth implementations: Unveiling zero day vulnerabilities and security flaws in modern Bluetooth stacks.
☆275Updated 3 years ago
Alternatives and similar repositories for BlueBorne:
Users that are interested in BlueBorne are comparing it to the libraries listed below
- PoC scripts demonstrating the BlueBorne vulnerabilities☆594Updated 3 years ago
- Bluetooth scanner for local devices that may be vulnerable to Blueborne exploit☆152Updated 7 years ago
- Blueborne CVE-2017-0785 Android information leak vulnerability☆465Updated 7 years ago
- Python script to inject existing Android applications with a Meterpreter payload.☆645Updated last year
- Wireless Hacking, WiFi Security, Vulnerability Analyzer, Pentestration☆286Updated 2 years ago
- (deprecated) Android application vulnerability analysis and Android pentest tool☆286Updated 6 years ago
- A Phishing Dropper designed to Pentest.☆270Updated 7 years ago
- WiFi-autopwner: script to automate searching and auditing Wi-Fi networks with weak security☆228Updated 6 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆223Updated 3 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆437Updated 7 years ago
- Auto Root Exploit Tool☆531Updated last year
- transform your payload.exe into one fake word doc (.ppt)☆465Updated 5 years ago
- Bluetooth hacking tools☆422Updated last year
- metasploitHelper☆246Updated 4 years ago
- An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)☆332Updated 7 months ago
- Embed a Metasploit Payload in an Original .Apk File☆117Updated 4 years ago
- Hostapd fork including Wi-Fi attacks and providing Python bindings with ctypes.☆179Updated 3 years ago
- An advanced network scan and attack script based on GUI. 2nd version of no-GUI netattack.☆434Updated 7 years ago
- Android Trojan☆192Updated 10 years ago
- BadUSB 2.0 USB-HID MiTM POC☆283Updated 8 years ago
- Converts a USB Rubber ducky script into a Kali Nethunter friendly format for the HID attack☆138Updated 10 years ago
- SSLStrip version to defeat HSTS☆316Updated 7 years ago
- Android APK Antivirus evasion for msfvenom generated payloads.☆188Updated 6 years ago
- Python clone of arpspoof that can poison hosts via arp-requests as well as arp-replies☆193Updated 6 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,400Updated 6 years ago
- caplets and proxy modules.☆494Updated this week
- NXcrypt - 'python backdoor' framework☆363Updated 7 years ago
- DNS spoofer. Drops DNS responses from the router and replaces it with the spoofed DNS response☆283Updated 7 years ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing☆355Updated 5 months ago
- Offensive DNS server☆316Updated 3 years ago