π¨ CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) π Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)
β1,817Feb 11, 2026Updated 2 months ago
Alternatives and similar repositories for BlueDucky
Users that are interested in BlueDucky are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- β731Jun 24, 2024Updated last year
- PoC to record audio from a Bluetooth deviceβ1,577Apr 4, 2024Updated 2 years ago
- Incident Response (IR) tool to create a list of USB-Rubber-Ducky instructions.β56Jun 8, 2019Updated 6 years ago
- BlueToolkit is an extensible Bluetooth Classic vulnerability testing framework that helps uncover new and old vulnerabilities in Bluetooβ¦β677Mar 5, 2026Updated last month
- Random OSINT idea tool thingβ24Jan 11, 2026Updated 3 months ago
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Extracts faces from youtube videosβ18Nov 7, 2023Updated 2 years ago
- CVE-2023-45866 - BluetoothDucky implementation (Using DuckyScript)β11Jan 15, 2024Updated 2 years ago
- A Series of Baseband & LMP Exploits against Bluetooth Classic Controllersβ554Aug 31, 2024Updated last year
- 802.11 Attack Toolβ1,821Updated this week
- Profile layoutβ15Sep 11, 2025Updated 7 months ago
- Pentesting Bluetoothβ49Feb 7, 2025Updated last year
- Quick commands for pentesting/No typing!β18Nov 21, 2023Updated 2 years ago
- β4,730Mar 12, 2026Updated last month
- USB Army Knife β the ultimate close access tool for penetration testers and red teamers.β2,448Mar 10, 2026Updated last month
- 1-Click AI Models by DigitalOcean Gradient β’ AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Bluetooth rubberducky, Keyboard & Mouse Emulator for Kali NetHunter and NetHunter Proβ15Nov 30, 2025Updated 4 months ago
- A suite of WiFi/Bluetooth offensive and defensive tools for the ESP32β10,446Updated this week
- Apple BLE proximity pairing message spoofingβ1,870Jun 17, 2024Updated last year
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of β¦β14,816Oct 6, 2025Updated 6 months ago
- Powerful framework for rogue access point attack.β2,417Jan 9, 2024Updated 2 years ago
- The Havoc Frameworkβ8,266Dec 18, 2025Updated 3 months ago
- The Official USB Rubber Ducky Payload Repositoryβ5,628Mar 20, 2026Updated 3 weeks ago
- An all-in-one hacking tool to remotely exploit Android devices using ADB and Metasploit-Framework to get a Meterpreter session.β5,698Updated this week
- A simple and easy way to find Flipper Zero Devices and Bluetooth Low Energy Based Attacksβ1,001Jan 21, 2026Updated 2 months ago
- Wordpress hosting with auto-scaling on Cloudways β’ AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- WiFi Penetration Testing & Auditing Toolβ767Apr 28, 2025Updated 11 months ago
- 5G NR Attacks against Qualcomm and Mediatek smartphones. Fuzzer includedβ‘β664Mar 11, 2026Updated last month
- Crashes iOS 17 Devices using really any deviceβ582Jun 23, 2024Updated last year
- Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionalityβ¦β4,367May 21, 2025Updated 10 months ago
- A simple script that makes possible BLE deauthentication!β321Sep 29, 2022Updated 3 years ago
- Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, inβ¦β2,441Apr 17, 2024Updated last year
- An intelligence gathering tool for hacking Bluetoothβ995Apr 23, 2023Updated 2 years ago
- The Network Execution Toolβ5,407Updated this week
- Wireshark-compatible all-channel BLE sniffer for bladeRF, with wideband Bluetooth sniffing for HackRF and USRPβ409Nov 23, 2025Updated 4 months ago
- NordVPN Special Discount Offer β’ AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- This is a multi-use bash script for Linux systems to audit wireless networks.β7,619Mar 28, 2026Updated 2 weeks ago
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.β355Jun 18, 2024Updated last year
- Scripts and Tips for Kali Linux Pi-Tail Editionβ11Dec 8, 2023Updated 2 years ago
- Tool developed to fuzz the GATT layer of the Bluetooth Low Energy protocol based on defined attack scenarios.β67Oct 25, 2024Updated last year
- Bookmarklet to find endpoints easily with one clickβ79May 19, 2024Updated last year
- Evil-M5Project is an innovative tool developed for ethical hacking and exploration of WiFi networks. It's compatible with Cardputer, Atoβ¦β2,112Mar 14, 2026Updated 3 weeks ago
- Wi-Fi Exploitation Frameworkβ2,773Sep 24, 2025Updated 6 months ago