otx2s / BlueDOS
Bluetooth dos
☆12Updated 6 years ago
Alternatives and similar repositories for BlueDOS
Users that are interested in BlueDOS are comparing it to the libraries listed below
Sorting:
- Hacking Tools Z0172CK☆31Updated last year
- Simple script to bulk check if IPs match networks☆12Updated 3 years ago
- Make a Fake wireless access point aka Evil Twin....Easily!!☆68Updated 2 years ago
- Captive Portal Attack Tool☆8Updated 4 years ago
- All In One Pentesting Tool For Recon & Auditing , Phone Number Lookup , Header , SSH Scan , SSL/TLS Scan & Much More.☆79Updated 4 months ago
- Metagoofil is an information gathering tool designed for extracting metadata of public documents (pdf,doc,xls,ppt,docx,pptx,xlsx) belongi…☆15Updated 10 years ago
- FUD Win32 Keylogger and Reverse Shell (cmd.exe)☆18Updated 2 years ago
- Python Script to help/automate the WiFi hacking exercises.☆86Updated 4 years ago
- ☆15Updated 3 years ago
- A lightweight ducky script generator written in python.☆30Updated 4 years ago
- dedsec is a hacking framework filled with hacking tools that you can use directly in the script☆26Updated 5 years ago
- The Advanced Automated Pen testing And Forensics Tool NoJle built using python it's for lazy hackers to automate most used Linux commands…☆42Updated 3 years ago
- A Tool using Shodan and RTSP to find vulnerable cameras around the world.☆59Updated 4 years ago
- Usage of WH-HackerExploit (WH-Boomber) Hacking Tool for attacking targets without prior mutual consent is illegal. It's the end user's re…☆23Updated 4 years ago
- Payload delivery via URL and some social engineering.☆17Updated 10 months ago
- Wifi network scanning tool for capturing WPA/WPA2 Handshakes☆26Updated 4 years ago
- ☆12Updated 6 years ago
- Hollywood-style CCTV hacking - PoC☆35Updated 4 years ago
- ☆10Updated 4 years ago
- [ Multi Encryption / Decryption ]☆20Updated 5 years ago
- A Multi-Usable Bomber for Linux and Termux. SMS, TCP, UDP etc..☆21Updated 4 years ago
- Find exploits in local and online database☆74Updated 7 months ago
- This is a keylogger that collects all the data and e-mail it in a set time with system information which includes device S/N and hardware…☆46Updated 2 years ago
- ☆19Updated 6 years ago
- Wifi-Confusion is a tool to create to Fake Wifi Acess-Points to Confuse the Victim☆18Updated 4 years ago
- Information Gathering Tool☆54Updated 2 years ago
- Virus Repository☆23Updated 3 years ago
- 🌐🔍 Red Network Tool is a tool for network exploration and info finding.☆40Updated 3 years ago
- PhishLog is a penetration testing and red teaming tool that automates the setup of a live keylogger that could be used with phishing camp…☆30Updated 6 years ago
- Hack Windows with FUD backdoor/payload, Escalates LINUX privileges, Devastate Linux, Tunnel forwarding☆15Updated 4 years ago