metaver5o / blueborneLinks
The dangers of Bluetooth implementations: Unveiling zero day vulnerabilities and security flaws in modern Bluetooth stacks.
☆35Updated 8 months ago
Alternatives and similar repositories for blueborne
Users that are interested in blueborne are comparing it to the libraries listed below
Sorting:
- A brief analysis of the BlueBorne Vulnerability Scanner app by Armis☆23Updated 7 years ago
- Blueborne CVE-2017-1000251 PoC for linux machines☆17Updated 2 years ago
- Scan/Exploit Blueborne CVE-2017-0785☆30Updated 7 years ago
- Various Scripts for Mobile Pen-testing with Frida☆76Updated 8 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆37Updated 7 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆52Updated 7 years ago
- ☆20Updated 9 years ago
- An automated Python + Ruby based XXE Exploiter (GUI + CLI)☆20Updated 8 years ago
- Tools for check NSA EGBL exploit against Fortinet Firewall☆32Updated 8 years ago
- shadowbroker SMB exploit scanner. Scans for ETERNALSYNERGY ETERNALBLUE ETERNALROMANCE ETHERNALCHAMPION☆37Updated 8 years ago
- A security write-up about the Paypal API & data leakage☆24Updated 9 years ago
- iOS Frida Scripts☆38Updated 7 years ago
- Linux tool used to extract sensitive data, inject backdoor or drop remote shells on android devices.☆107Updated 9 years ago
- Automatic backdooring apk with meterpreter (PoC)☆51Updated 8 years ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆45Updated 6 years ago
- An experiment into dynamic hooking and modification of Android application functions and return values.☆33Updated 7 years ago
- ☆53Updated 7 years ago
- Break Apps with Frida workshop material☆42Updated 7 years ago
- Public Android Vulnerability Information (CVE PoCs etc)☆86Updated 8 years ago
- Proof of Concepts, Exploits☆28Updated last month
- XXE vulnerability demo☆22Updated 11 years ago
- Bluetooth Low Energy Device spoofing library☆26Updated 7 years ago
- ☆44Updated 10 years ago
- Archive Mirror for recently republished PoC/Exploit code☆20Updated 7 years ago
- Faraday Workspaces for Bug Bounties☆21Updated 9 years ago
- PLASMA PULSAR☆69Updated 8 years ago
- PoC Exploit for AOSP UserDictionary Content Provider (CVE-2018-9375)☆21Updated 6 years ago
- Free KeyLogger for Kali Linux and Ubuntu☆37Updated 9 years ago
- RECon 2017 IDA skin & color scheme☆28Updated 7 years ago
- Unix remote-shell backdoor develop with Bash, Netcat, OpenSSL (data encryption with AES-128bit)☆25Updated 7 years ago