nccgroup / BLESuite-CLILinks
BLESuite_CLI is a command line tool to enable an easier way to test Bluetooth Low Energy (BLE) devices
☆32Updated 9 years ago
Alternatives and similar repositories for BLESuite-CLI
Users that are interested in BLESuite-CLI are comparing it to the libraries listed below
Sorting:
- NAT Pinning test suite tool for penetration testers.☆31Updated 11 years ago
- ☆20Updated 9 years ago
- Format string exploit generation☆10Updated 9 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆26Updated 8 years ago
- KillerZee: Tools for Attacking and Evaluating Z-Wave Networks☆54Updated 6 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 6 years ago
- Patch for hostapd and wpa_supplicant to attempt to exploit heartbleed on EAP-PEAP/TLS/TTLS connections☆106Updated 11 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆39Updated 9 years ago
- For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆37Updated 11 years ago
- A few ZigBee Tools to compliment KillerBee☆54Updated 9 years ago
- A GUI-based USB device fuzzer☆64Updated 7 years ago
- spectrum monitoring system for GSM providers☆44Updated 9 years ago
- Tool for automation of GUI-based testing.☆16Updated 10 years ago
- Faraday Workspaces for Bug Bounties☆21Updated 9 years ago
- Arp spoof detection tool☆24Updated 8 years ago
- Burp and ZAP plugin that display image metadata (JPEG Exif or PNG text chunk).☆14Updated 2 years ago
- A while back antirez, in a post to Bugtraq, detailed a new Tcp portscan method.☆16Updated 8 years ago
- A fuzzing script for MitmProxy☆22Updated 10 years ago
- ☆16Updated 9 years ago
- Virtual host brute forcer☆22Updated 11 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- A python script for obfuscating wireless networks☆79Updated 8 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 9 years ago
- Scripts and tools for ISM hacking☆16Updated 7 years ago
- Phishing Toolkit☆20Updated 7 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆34Updated 3 years ago
- ANWI - All New Wireless IDS☆28Updated 6 years ago
- Burp extension for decoding WCF-gzipped requests.☆12Updated 9 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Updated 5 months ago