marcnewlin / hi_my_name_is_keyboardLinks
☆706Updated last year
Alternatives and similar repositories for hi_my_name_is_keyboard
Users that are interested in hi_my_name_is_keyboard are comparing it to the libraries listed below
Sorting:
- BlueToolkit is an extensible Bluetooth Classic vulnerability testing framework that helps uncover new and old vulnerabilities in Bluetoo…☆562Updated last month
- Bluetooth Forward and Future Secrecy Attacks and Defenses (BLUFFS) [CVE 2023-24023]☆519Updated last year
- PoC to record audio from a Bluetooth device☆1,466Updated last year
- poc for CVE-2025-24252 & CVE-2025-24132☆125Updated 4 months ago
- A Series of Baseband & LMP Exploits against Bluetooth Classic Controllers☆513Updated last year
- Wireless Hacking Devices Protocol client☆237Updated this week
- 🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard…☆1,658Updated 5 months ago
- 5G NR Attacks against Qualcomm and Mediatek smartphones. Fuzzer included⚡☆600Updated 3 weeks ago
- 🤖🏴☠️ radare2 plugin for GPT-4 🦜. Solve crackmes automatically 🪄☆277Updated last year
- List of Bluetooth BR/EDR/LE security resources☆572Updated this week
- Exploit for 6.4 - 6.5 kernels and another exploit for 5.15 - 6.5☆844Updated last year
- Collection of USB hacking links and materials for my talk on the topic☆350Updated last month
- 🔓A Curated List Of Modern Android Exploitation Conference Talks.☆547Updated last week
- poc for CVE-2024-38063 (RCE in tcpip.sys)☆679Updated last year
- Hardware/IOT Pentesting Wiki☆719Updated 2 months ago
- CVE-2023-38831 winrar exploit generator☆788Updated last year
- A simple, very experimental TPM sniffer for LPC bus☆635Updated last year
- ☆225Updated last year
- Microsoft-Outlook-Remote-Code-Execution-Vulnerability☆740Updated last year
- ☆523Updated 8 months ago
- exploits for CVE-2024-20017☆139Updated last year
- Exploit for command injection vulnerability found in uhttpd binary from TP-Link Tapo c200 IP camera☆93Updated 11 months ago
- Wi-Fi Framework for creating proof-of-concepts, automated experiments, test suites, fuzzers, and more.☆242Updated 5 months ago
- Autofill Phishing☆76Updated last month
- Phishing with a fake reCAPTCHA☆611Updated last year
- Hack-A-Sat Qualifiers Writeups☆256Updated 2 years ago
- AI assistant that utilizes GPT language models to interpret and generate cybersecurity payloads 🪄☆278Updated last year
- This is a shell script that creates an SSH backdoor on an iPhone.☆222Updated last year
- "Bob the Smuggler": A tool that leverages HTML Smuggling Attack and allows you to create HTML files with embedded 7z/zip archives. The to…☆557Updated 6 months ago
- Crashes iOS 17 Devices using a really any device☆532Updated last year