mailinneberg / BlueBorneLinks
Purpose only! The dangers of Bluetooth implementations: Unveiling zero day vulnerabilities and security flaws in modern Bluetooth stacks.
☆280Updated 3 years ago
Alternatives and similar repositories for BlueBorne
Users that are interested in BlueBorne are comparing it to the libraries listed below
Sorting:
- Blueborne CVE-2017-0785 Android information leak vulnerability☆466Updated 7 years ago
- PoC scripts demonstrating the BlueBorne vulnerabilities☆604Updated 4 years ago
- Bluetooth scanner for local devices that may be vulnerable to Blueborne exploit☆153Updated 7 years ago
- Python script to inject existing Android applications with a Meterpreter payload.☆646Updated 2 years ago
- SSLStrip version to defeat HSTS☆319Updated 7 years ago
- Bluetooth hacking tools☆443Updated 2 years ago
- transform your payload.exe into one fake word doc (.ppt)☆467Updated 5 years ago
- Blueborne CVE-2017-0781 Android heap overflow vulnerability☆141Updated 4 years ago
- Wireless Hacking, WiFi Security, Vulnerability Analyzer, Pentestration☆294Updated 2 years ago
- Proof-of-concept of the KRACK attack against Linux and Android☆152Updated 7 years ago
- Converts a USB Rubber ducky script into a Kali Nethunter friendly format for the HID attack☆138Updated 10 years ago
- Embed a Metasploit Payload in an Original .Apk File☆117Updated 4 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆223Updated 4 years ago
- Krack POC☆125Updated 7 years ago
- Android APK Antivirus evasion for msfvenom generated payloads.☆194Updated 6 years ago
- (deprecated) Android application vulnerability analysis and Android pentest tool☆289Updated 6 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆441Updated 8 years ago
- Hostapd fork including Wi-Fi attacks and providing Python bindings with ctypes.☆186Updated 4 years ago
- this script automatically install any package for pentest with uptodate tools , and lazy command for run the tools like lazynmap , instal…☆370Updated 8 years ago
- Car Backdoor Maker☆220Updated 6 years ago
- intercepting kali router☆440Updated 7 years ago
- An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)☆333Updated last year
- metasploitHelper☆249Updated 5 years ago
- WPS hacking scripts☆280Updated last year
- A Phishing Dropper designed to Pentest.☆272Updated 8 years ago
- BadUSB 2.0 USB-HID MiTM POC☆284Updated 9 years ago
- Android Trojan☆192Updated 10 years ago
- Modified hostapd to facilitate AP impersonation attacks☆516Updated 7 years ago
- Python clone of arpspoof that can poison hosts via arp-requests as well as arp-replies☆193Updated 6 years ago
- 📡🍓🍍 Detects wireless network attacks performed by KARMA module (fake AP). Starts deauthentication attack (for fake access points)☆253Updated 6 years ago