π¨ CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) π Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)
β1,826Feb 11, 2026Updated 3 months ago
Alternatives and similar repositories for BlueDucky
Users that are interested in BlueDucky are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- β727Jun 24, 2024Updated last year
- PoC to record audio from a Bluetooth deviceβ1,582Apr 24, 2026Updated 3 weeks ago
- BlueToolkit is an extensible Bluetooth Classic vulnerability testing framework that helps uncover new and old vulnerabilities in Bluetooβ¦β694Mar 5, 2026Updated 2 months ago
- Incident Response (IR) tool to create a list of USB-Rubber-Ducky instructions.β56Jun 8, 2019Updated 6 years ago
- Random OSINT idea tool thingβ27Jan 11, 2026Updated 4 months ago
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Extracts faces from youtube videosβ19Nov 7, 2023Updated 2 years ago
- CVE-2023-45866 - BluetoothDucky implementation (Using DuckyScript)β11Jan 15, 2024Updated 2 years ago
- A Series of Baseband & LMP Exploits against Bluetooth Classic Controllersβ561Aug 31, 2024Updated last year
- 802.11 Attack Toolβ1,847Updated this week
- Profile layoutβ15Sep 11, 2025Updated 8 months ago
- Pentesting Bluetoothβ49Feb 7, 2025Updated last year
- Quick commands for pentesting/No typing!β19Nov 21, 2023Updated 2 years ago
- β4,788Mar 12, 2026Updated 2 months ago
- Bluetooth rubberducky, Keyboard & Mouse Emulator for Kali NetHunter and NetHunter Proβ15Nov 30, 2025Updated 5 months ago
- Virtual machines for every use case on DigitalOcean β’ AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- USB Army Knife β the ultimate close access tool for penetration testers and red teamers.β2,584Mar 10, 2026Updated 2 months ago
- Apple BLE proximity pairing message spoofingβ1,884Jun 17, 2024Updated last year
- A suite of WiFi/Bluetooth offensive and defensive tools for the ESP32β10,812May 5, 2026Updated 2 weeks ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of β¦β15,080Oct 6, 2025Updated 7 months ago
- Powerful framework for rogue access point attack.β2,451Jan 9, 2024Updated 2 years ago
- The Official USB Rubber Ducky Payload Repositoryβ5,730May 9, 2026Updated 2 weeks ago
- The Havoc Frameworkβ8,361Dec 18, 2025Updated 5 months ago
- An all-in-one hacking tool to remotely exploit Android devices using ADB and Metasploit-Framework to get a Meterpreter session.β5,866Updated this week
- A simple and easy way to find Flipper Zero Devices and Bluetooth Low Energy Based Attacksβ1,008Jan 21, 2026Updated 4 months ago
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- WiFi Penetration Testing & Auditing Toolβ780Apr 28, 2025Updated last year
- 5G NR Attacks against Qualcomm and Mediatek smartphones. Fuzzer included β‘β668Mar 11, 2026Updated 2 months ago
- Crashes iOS 17 Devices using really any deviceβ592Jun 23, 2024Updated last year
- Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionalityβ¦β4,383May 21, 2025Updated last year
- A simple script that makes possible BLE deauthentication!β331Apr 14, 2026Updated last month
- This is a multi-use bash script for Linux systems to audit wireless networks.β7,730May 14, 2026Updated last week
- Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, inβ¦β2,446Apr 17, 2024Updated 2 years ago
- An intelligence gathering tool for hacking Bluetoothβ998Apr 23, 2023Updated 3 years ago
- The Network Execution Toolβ5,517May 12, 2026Updated last week
- AI Agents on DigitalOcean Gradient AI Platform β’ AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Wireshark-compatible all-channel BLE sniffer for bladeRF, with wideband Bluetooth sniffing for HackRF and USRPβ415Nov 23, 2025Updated 6 months ago
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.β360Jun 18, 2024Updated last year
- Scripts and Tips for Kali Linux Pi-Tail Editionβ11Dec 8, 2023Updated 2 years ago
- Tool developed to fuzz the GATT layer of the Bluetooth Low Energy protocol based on defined attack scenarios.β70Oct 25, 2024Updated last year
- Bookmarklet to find endpoints easily with one clickβ81May 19, 2024Updated 2 years ago
- Evil-M5Project is an innovative tool developed for ethical hacking and exploration of WiFi networks. It's compatible with Cardputer, Atoβ¦β2,234May 1, 2026Updated 3 weeks ago
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.β3,460Jan 19, 2025Updated last year