π¨ CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) π Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)
β1,806Feb 11, 2026Updated last month
Alternatives and similar repositories for BlueDucky
Users that are interested in BlueDucky are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- β730Jun 24, 2024Updated last year
- PoC to record audio from a Bluetooth deviceβ1,573Apr 4, 2024Updated last year
- Incident Response (IR) tool to create a list of USB-Rubber-Ducky instructions.β56Jun 8, 2019Updated 6 years ago
- BlueToolkit is an extensible Bluetooth Classic vulnerability testing framework that helps uncover new and old vulnerabilities in Bluetooβ¦β667Mar 5, 2026Updated 2 weeks ago
- Random OSINT idea tool thingβ24Jan 11, 2026Updated 2 months ago
- Extracts faces from youtube videosβ18Nov 7, 2023Updated 2 years ago
- CVE-2023-45866 - BluetoothDucky implementation (Using DuckyScript)β11Jan 15, 2024Updated 2 years ago
- A Series of Baseband & LMP Exploits against Bluetooth Classic Controllersβ552Aug 31, 2024Updated last year
- 802.11 Attack Toolβ1,806Updated this week
- Profile layoutβ15Sep 11, 2025Updated 6 months ago
- Pentesting Bluetoothβ49Feb 7, 2025Updated last year
- Quick commands for pentesting/No typing!β18Nov 21, 2023Updated 2 years ago
- β4,720Mar 12, 2026Updated last week
- USB Army Knife β the ultimate close access tool for penetration testers and red teamers.β2,379Mar 10, 2026Updated last week
- Bluetooth rubberducky, Keyboard & Mouse Emulator for Kali NetHunter and NetHunter Proβ15Nov 30, 2025Updated 3 months ago
- A suite of WiFi/Bluetooth offensive and defensive tools for the ESP32β10,242Updated this week
- Apple BLE proximity pairing message spoofingβ1,867Jun 17, 2024Updated last year
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of β¦β14,756Oct 6, 2025Updated 5 months ago
- Powerful framework for rogue access point attack.β2,410Jan 9, 2024Updated 2 years ago
- The Havoc Frameworkβ8,245Dec 18, 2025Updated 3 months ago
- The Official USB Rubber Ducky Payload Repositoryβ5,604Updated this week
- An all-in-one hacking tool to remotely exploit Android devices using ADB and Metasploit-Framework to get a Meterpreter session.β5,672Apr 19, 2024Updated last year
- A simple and easy way to find Flipper Zero Devices and Bluetooth Low Energy Based Attacksβ994Jan 21, 2026Updated 2 months ago
- WiFi Penetration Testing & Auditing Toolβ755Apr 28, 2025Updated 10 months ago
- 5G NR Attacks against Qualcomm and Mediatek smartphones. Fuzzer includedβ‘β661Mar 11, 2026Updated last week
- Crashes iOS 17 Devices using really any deviceβ581Jun 23, 2024Updated last year
- Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionalityβ¦β4,353May 21, 2025Updated 10 months ago
- A simple script that makes possible BLE deauthentication!β313Sep 29, 2022Updated 3 years ago
- An intelligence gathering tool for hacking Bluetoothβ990Apr 23, 2023Updated 2 years ago
- Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, inβ¦β2,439Apr 17, 2024Updated last year
- The Network Execution Toolβ5,356Updated this week
- Wireshark-compatible all-channel BLE sniffer for bladeRF, with wideband Bluetooth sniffing for HackRF and USRPβ406Nov 23, 2025Updated 4 months ago
- This is a multi-use bash script for Linux systems to audit wireless networks.β7,571Mar 11, 2026Updated last week
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.β354Jun 18, 2024Updated last year
- Scripts and Tips for Kali Linux Pi-Tail Editionβ11Dec 8, 2023Updated 2 years ago
- Evil-M5Project is an innovative tool developed for ethical hacking and exploration of WiFi networks. It's compatible with Cardputer, Atoβ¦β2,066Mar 14, 2026Updated last week
- Tool developed to fuzz the GATT layer of the Bluetooth Low Energy protocol based on defined attack scenarios.β66Oct 25, 2024Updated last year
- Bookmarklet to find endpoints easily with one clickβ79May 19, 2024Updated last year
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.β3,434Jan 19, 2025Updated last year