marcnewlin / hi_my_name_is_keyboard
☆680Updated 9 months ago
Alternatives and similar repositories for hi_my_name_is_keyboard:
Users that are interested in hi_my_name_is_keyboard are comparing it to the libraries listed below
- BlueToolkit is an extensible Bluetooth Classic vulnerability testing framework that helps uncover new and old vulnerabilities in Bluetoo…☆399Updated last month
- PoC to record audio from a Bluetooth device☆1,065Updated 11 months ago
- 🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard…☆1,479Updated 7 months ago
- Bluetooth Forward and Future Secrecy Attacks and Defenses (BLUFFS) [CVE 2023-24023]☆505Updated last year
- 🤖🏴☠️ radare2 plugin for GPT-4 🦜. Solve crackmes automatically 🪄☆271Updated last year
- Microsoft-Outlook-Remote-Code-Execution-Vulnerability☆726Updated last year
- CVE-2023-38831 winrar exploit generator☆786Updated last year
- 5G NR Attacks against Qualcomm and Mediatek smartphones. Fuzzer included⚡☆543Updated 4 months ago
- Work in progress...☆390Updated 3 months ago
- poc for CVE-2024-38063 (RCE in tcpip.sys)☆654Updated 6 months ago
- Hardware/IOT Pentesting Wiki☆579Updated last week
- Wireless Hacking Devices Protocol client☆153Updated last week
- List of Bluetooth BR/EDR/LE security resources☆539Updated last year
- ☆518Updated 2 months ago
- A simple and easy way to find Flipper Zero Devices and Bluetooth Low Energy Based Attacks☆904Updated 3 weeks ago
- A tool to crack WPA2 passphrase with PMKID value without clients or de-authentication☆210Updated last year
- CVE-2024-0044: a "run-as any app" high-severity vulnerability affecting Android versions 12 and 13☆289Updated 3 months ago
- Network Security Sniffer☆772Updated last week
- Generates millions of keyword-based password mutations in seconds.☆1,269Updated 7 months ago
- exploits for CVE-2024-20017☆137Updated 6 months ago
- A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.☆733Updated 2 months ago
- Phishing with a fake reCAPTCHA☆509Updated 6 months ago
- USB Army Knife – the ultimate close access tool for penetration testers and red teamers.☆1,356Updated last week
- SSL bypass check☆243Updated last month
- PoC for CVE-2023-4911☆384Updated last year
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host…☆2,043Updated 8 months ago
- Exploit for 6.4 - 6.5 kernels and another exploit for 5.15 - 6.5☆845Updated 11 months ago
- Real-world infosec wordlists, updated regularly☆1,464Updated this week
- WiFi Penetration Testing & Auditing Tool☆490Updated last month
- Spoof emails from any of the +2 Million domains using MailChannels (DEFCON 31 Talk)☆334Updated last year