Bluetooth dos
☆15Mar 8, 2019Updated 7 years ago
Alternatives and similar repositories for BlueDOS
Users that are interested in BlueDOS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Script for quick and easy DOS-attacks on bluetooth devices for pentest purposes☆672Jan 29, 2024Updated 2 years ago
- Python tool to inject DLLs into processes☆11Jun 29, 2017Updated 8 years ago
- HP Power Manager 'formExportDataLogs' Buffer Overflow☆22Aug 13, 2017Updated 8 years ago
- SARA.apk as tiktok,apk ransomware☆19Mar 14, 2022Updated 4 years ago
- ☆15Dec 12, 2023Updated 2 years ago
- terminal splash screen based on ascii art ideal for bash or sh consoles☆12May 6, 2019Updated 6 years ago
- ☆15Mar 3, 2021Updated 5 years ago
- SocialFish-Clone☆11May 3, 2018Updated 7 years ago
- A fully public exploit of the CVE-2020-0022 BlueFrag Android RCE Vulnerability (tested on Pixel 3 XL)☆20Nov 21, 2023Updated 2 years ago
- Some of my config files☆12Feb 11, 2023Updated 3 years ago
- PMKID Attack Module for the WiFi Pineapple☆17Jul 14, 2023Updated 2 years ago
- ☆29Apr 22, 2017Updated 8 years ago
- Obtener la ubicación exácta de un dispositivo, con un enlace.☆11Apr 10, 2024Updated last year
- Safira en un script programado en bash que nos permite de manera automatica conectar y crear payload y los ejecuta atraves de metasploit …☆10Sep 27, 2020Updated 5 years ago
- Graphical User Interface for Termux☆14Oct 30, 2022Updated 3 years ago
- This is very usefull bluetooth jammer or doser tool in kali or parrot linux...☆166May 12, 2019Updated 6 years ago
- SidePeek.js is a curated set of JavaScript payloads for browser-based recon. Run them in DevTools or as bookmarklets to uncover hidden AP…☆21May 13, 2025Updated 10 months ago
- This is my own simple startpage inspired by bento :D☆11Aug 6, 2024Updated last year
- Instalación correcta de BeEF en Termux.☆11Aug 11, 2020Updated 5 years ago
- Ultimate phishing tool with Ngrok integrated.☆17Feb 7, 2018Updated 8 years ago
- Python script to check if there is any differences in responses of an application when the request comes from a search engine's crawler.☆25Oct 1, 2023Updated 2 years ago
- Facebook Mobile Phising Page☆11May 5, 2019Updated 6 years ago
- Decrypt powerpoint presentations without password☆11Sep 1, 2023Updated 2 years ago
- ☆12Jul 17, 2019Updated 6 years ago
- Collection of tools that aid in red team operations☆25Aug 23, 2018Updated 7 years ago
- Creates date-based wordlists that can be used for penetration testing, QA fixtures, or any workflow that needs exhaustive date coverage.☆16Oct 29, 2025Updated 4 months ago
- Get a reverse shell using PostgreSQL☆21Aug 16, 2024Updated last year
- Every device has a limit on the size of the L2CAP ping. If it gets an L2CAP ping packet, which is beyond the limit of the size, it will c…☆23Jan 25, 2026Updated last month
- Herramienta de Suplantación de Correos Electrónicos.☆11Sep 28, 2020Updated 5 years ago
- Python script that converts Grafana hash digests to PBKDF2_HMAC_SHA256 format in order to facilitate password cracking using Hashcat.☆26Oct 24, 2021Updated 4 years ago
- # Bash Encrypter & Decrypter☆15Sep 3, 2022Updated 3 years ago
- Creacion de una web falsa para obtener datos de tarjetas de credito☆13Aug 11, 2020Updated 5 years ago
- A tool which perform deauthentication attack on unpaired bluetooth devices.☆51Aug 30, 2025Updated 6 months ago
- ☆23Nov 19, 2019Updated 6 years ago
- ☆11Oct 29, 2019Updated 6 years ago
- Portable Keylogger for windows that actually works , saves all typed keys to a text file with the exe. You can compile it after adding pr…☆14Jan 2, 2022Updated 4 years ago
- This simple code snippet is used for brute force android apps with 4º digits passwords☆18Jan 17, 2019Updated 7 years ago
- Angecryption implementation in Python☆17Jun 2, 2019Updated 6 years ago
- some python3 functions to add spreading features to any python backdoor☆55Jan 22, 2017Updated 9 years ago