metaver5o / blueborneLinks
The dangers of Bluetooth implementations: Unveiling zero day vulnerabilities and security flaws in modern Bluetooth stacks.
☆35Updated 8 months ago
Alternatives and similar repositories for blueborne
Users that are interested in blueborne are comparing it to the libraries listed below
Sorting:
- A brief analysis of the BlueBorne Vulnerability Scanner app by Armis☆23Updated 7 years ago
- An automated Python + Ruby based XXE Exploiter (GUI + CLI)☆19Updated 8 years ago
- Blueborne CVE-2017-1000251 PoC for linux machines☆17Updated 2 years ago
- Various Scripts for Mobile Pen-testing with Frida☆76Updated 9 years ago
- Tools for check NSA EGBL exploit against Fortinet Firewall☆32Updated 8 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆37Updated 7 years ago
- Telegram Bot to manage botnets created with struts vulnerability(CVE-2017-5638)☆42Updated 3 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆53Updated 7 years ago
- ☆20Updated 9 years ago
- PLASMA PULSAR☆69Updated 8 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆121Updated 6 years ago
- Break Apps with Frida workshop material☆42Updated 7 years ago
- Archive Mirror for recently republished PoC/Exploit code☆20Updated 7 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- Free KeyLogger for Kali Linux and Ubuntu☆37Updated 9 years ago
- Faraday Workspaces for Bug Bounties☆21Updated 9 years ago
- Automatic backdooring apk with meterpreter (PoC)☆51Updated 8 years ago
- Unix remote-shell backdoor develop with Bash, Netcat, OpenSSL (data encryption with AES-128bit)☆25Updated 7 years ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆45Updated 7 years ago
- Scan/Exploit Blueborne CVE-2017-0785☆30Updated 7 years ago
- Node JS code for a set of Alexa voice skills designed to assist hackers and developers with common tasks☆56Updated 6 years ago
- Source Code Intelligence☆30Updated 7 years ago
- Metasploit installer for Debian (Jessie) VPS.☆25Updated 8 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆96Updated 7 years ago
- For BurpSuite Plugins☆11Updated 10 years ago
- CVE-2017-0785 BlueBorne PoC☆40Updated 7 years ago
- A multi-codec media fuzzing tool.☆42Updated 12 years ago
- A modular distributed penetration testing tool.☆41Updated 8 years ago
- A security write-up about the Paypal API & data leakage☆24Updated 9 years ago
- Linux rootkit and detection examples☆32Updated 9 years ago