Bluetooth device and service discovery tool that can be used for security assessment and penetration testing
☆16Dec 15, 2015Updated 10 years ago
Alternatives and similar repositories for BluPhish
Users that are interested in BluPhish are comparing it to the libraries listed below
Sorting:
- CDDC Exploitation Framework☆13Jul 3, 2023Updated 2 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- TP-Link Archer C50 V3 devices before Build 200318 Rel. 62209 allows remote attackers to cause a denial of service via a crafted HTTP Head…☆20Mar 29, 2020Updated 5 years ago
- PowerShell script to retreive wifi ESSIDs and Passwords.☆26Jul 28, 2017Updated 8 years ago
- Attack-Defend CTF Tools☆23Oct 30, 2016Updated 9 years ago
- ☆12May 13, 2020Updated 5 years ago
- Android Google Map 2 Project to find friend location with live movement.☆10Feb 9, 2015Updated 11 years ago
- WPUpdate is a simple Linux service that automatically checks for a new version of Wordpress each night at 2AM.☆36Feb 7, 2014Updated 12 years ago
- Additional resources and references for linux-exploit-suggester.sh☆30Oct 2, 2020Updated 5 years ago
- Some exploits for ZeroNights 0x03☆36Jul 3, 2015Updated 10 years ago
- Find a useable IP address to use☆30Jul 4, 2014Updated 11 years ago
- ☆102May 5, 2020Updated 5 years ago
- ARP Poisoning Defense Scripts☆38Oct 14, 2017Updated 8 years ago
- Security tools, scanners, exploit code☆31Oct 21, 2017Updated 8 years ago
- Gathers public information on companies to highlight social engineering risk.☆30May 25, 2016Updated 9 years ago
- python script to merge two apk into one☆30Jul 8, 2015Updated 10 years ago
- The ChromeCast Exploitation Kit☆37Sep 2, 2023Updated 2 years ago
- Rust bindings to aubio☆11Apr 13, 2020Updated 5 years ago
- Download porn videos (Python)☆14Apr 12, 2018Updated 7 years ago
- ☆35Dec 5, 2025Updated 3 months ago
- Experiments in trying to find 0-days in numpy☆38Jul 1, 2017Updated 8 years ago
- Opensvp is a security tool implementing "attacks" to be able to test the resistance of firewall to protocol level attack.☆49Feb 20, 2017Updated 9 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆33Feb 26, 2016Updated 10 years ago
- Admin Panel Finder☆39Sep 22, 2025Updated 5 months ago
- Launcher for the fifa live editor☆10Updated this week
- bot and proxy for Minecraft☆24May 7, 2013Updated 12 years ago
- A C# Winforms based GUI app, that allows you to extract files from Drakengard 1 and 2. repacking is supported too.☆14Jul 11, 2025Updated 7 months ago
- Returns a stream of English words☆22Apr 30, 2024Updated last year
- Metasploit_postgresql_database_connection_fix☆12Jan 30, 2019Updated 7 years ago
- Python3 Module to interact with the SonicWall® SonicOS API☆14Jan 6, 2025Updated last year
- A library and tool for querying, executing and exporting TR-064 devices and services☆10Apr 4, 2018Updated 7 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆39Feb 21, 2016Updated 10 years ago
- 鉴穹日志安全分析系统☆18Sep 7, 2025Updated 6 months ago
- A script to create, mount and umount LUKS encrypted disk image files.☆17Jun 24, 2024Updated last year
- Perintah : $pkg update && pkg upgrade $pkg install python2 $pkg install git $git clone https://github.com/spider-fb/spider-fb $pip2 …☆10Jul 10, 2020Updated 5 years ago
- CVE-2022-26135☆11Jul 12, 2022Updated 3 years ago
- Tools for diffing and comparing web content. Also includes a web server that makes diffs available as an HTTP service.☆18Mar 1, 2026Updated last week
- Small Node CLI tool to extract active contributors on repos and orgs☆10Dec 6, 2022Updated 3 years ago
- ☆10Nov 30, 2020Updated 5 years ago