metaver5o / blueborne
The dangers of Bluetooth implementations: Unveiling zero day vulnerabilities and security flaws in modern Bluetooth stacks.
☆35Updated 4 months ago
Alternatives and similar repositories for blueborne:
Users that are interested in blueborne are comparing it to the libraries listed below
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆36Updated 7 years ago
- Blueborne CVE-2017-1000251 PoC for linux machines☆16Updated last year
- A brief analysis of the BlueBorne Vulnerability Scanner app by Armis☆23Updated 7 years ago
- Scan/Exploit Blueborne CVE-2017-0785☆30Updated 6 years ago
- Crash macOS and iOS devices with one packet☆48Updated 6 years ago
- Work in progress toolkit for KRACK attack.☆69Updated 5 years ago
- Archive Mirror for recently republished PoC/Exploit code☆20Updated 7 years ago
- iOS Frida Scripts☆38Updated 7 years ago
- Universal Plug and Fuzz☆41Updated 5 years ago
- Tools for check NSA EGBL exploit against Fortinet Firewall☆32Updated 8 years ago
- 1st phase of mifare classic nested auth key recovery☆23Updated 6 years ago
- Automatic backdooring apk with meterpreter (PoC)☆51Updated 8 years ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆45Updated 6 years ago
- Various Scripts for Mobile Pen-testing with Frida☆75Updated 8 years ago
- DNS rebinding is powerful: how to steal WiFi passwords by just tricking a victim into visiting a website, thanks to that fancy Bang & Olu…☆81Updated 5 years ago
- ☆20Updated 8 years ago
- Faraday Workspaces for Bug Bounties☆20Updated 9 years ago
- A security write-up about the Paypal API & data leakage☆24Updated 8 years ago
- Python implementation of pattern_create and pattern_offset from Metasploit Framework☆18Updated 5 years ago
- 0x88 exploit pack Decoded☆28Updated 10 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆50Updated 7 years ago
- ☆15Updated 8 years ago
- JavaScript exploit : Firefox version 41 - 50 are affected. Easy fix by disabling JavaScript (use NoScript for better leverage). Victim mu…☆19Updated 8 years ago
- CVE-2017-0785 BlueBorne PoC☆39Updated 7 years ago
- Take full control of a OSX user or root account via command line.☆99Updated 6 years ago
- Format string exploit generation☆10Updated 9 years ago
- CVE-2017-9791☆27Updated 7 years ago
- Proof of Concepts, Exploits☆28Updated 6 years ago
- Proof-of-Concept exploits for D-Link DIR8xx routers☆37Updated 7 years ago
- PLASMA PULSAR☆69Updated 7 years ago