pieterbork / blueborneView external linksLinks
Scan/Exploit Blueborne CVE-2017-0785
☆31Feb 28, 2018Updated 7 years ago
Alternatives and similar repositories for blueborne
Users that are interested in blueborne are comparing it to the libraries listed below
Sorting:
- Blueborne CVE-2017-1000251 PoC for linux machines☆17Mar 10, 2023Updated 2 years ago
- Exploit for Mass Remote Code Execution on GPON home routers (CVE-2018-10562) obtained from Shodan.☆24May 26, 2018Updated 7 years ago
- CVE-2017-0785 BlueBorne PoC☆38Sep 22, 2017Updated 8 years ago
- CVE-2018-11311 | mySCADA myPRO 7 Hardcoded FTP Username and Password Vulnerability☆12Jul 2, 2018Updated 7 years ago
- Exploiting cameras with a very distinctive HTTP Server header of "JAWS/1.0".☆10Jan 11, 2023Updated 3 years ago
- Purpose only! The dangers of Bluetooth implementations: Unveiling zero day vulnerabilities and security flaws in …☆283Aug 23, 2021Updated 4 years ago
- Blueborne CVE-2017-0785 Android information leak vulnerability☆472Sep 23, 2017Updated 8 years ago
- Scripts and other goodies from the pwnieexpress project ported☆10Mar 16, 2014Updated 11 years ago
- like hacking, this is a brutefore for DVR - camara HIKVision☆16Sep 2, 2017Updated 8 years ago
- Pcaps for PeddleCheap and implant communication + script for interpreting and decrypting pcaps.☆17Nov 29, 2017Updated 8 years ago
- Juniper backdoor☆14Dec 24, 2015Updated 10 years ago
- Proof of Concept for CVE-2018-11776☆21Sep 12, 2018Updated 7 years ago
- Firmware analysis website + API☆43Oct 1, 2020Updated 5 years ago
- Public WCSC writeups☆19Sep 18, 2017Updated 8 years ago
- This python/jython script is used as plugin to BinNavi tool to analyze a x86 binanry file to find buffer overflow prone functions. Such f…☆29Jan 8, 2013Updated 13 years ago
- Thunderclap QEMU-based network card emulation☆30Oct 3, 2022Updated 3 years ago
- A brief analysis of the BlueBorne Vulnerability Scanner app by Armis☆24Sep 14, 2017Updated 8 years ago
- :.IP webcam penetration test suit.:☆24Apr 8, 2019Updated 6 years ago
- exploit vulnerable c/c++ programms with buffer overflow attacks☆24Jul 18, 2022Updated 3 years ago
- PoC scripts demonstrating the BlueBorne vulnerabilities☆610May 17, 2021Updated 4 years ago
- DVR-Exploiter a Bash Script Program Exploit The DVR's Based on CVE-2018-9995☆111Oct 11, 2018Updated 7 years ago
- An exploit for Microsoft IIS 6.0 CVE-2017-7269☆22Mar 29, 2017Updated 8 years ago
- ☆27Nov 4, 2015Updated 10 years ago
- Check All APK's -- scripts for checking your phone for malware☆30Aug 8, 2017Updated 8 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Nov 11, 2022Updated 3 years ago
- Thunderclap hardware for Intel Arria 10 FPGA☆34May 21, 2019Updated 6 years ago
- Webshell Jumping Edition☆30May 9, 2017Updated 8 years ago
- ☆10Nov 24, 2018Updated 7 years ago
- Ingest Nessus files into Elasticsearch using PowerShell!☆16Nov 14, 2025Updated 3 months ago
- Cuda Miner for BeamHash (Equihash 150,5)☆13Jan 16, 2019Updated 7 years ago
- ☆14Jan 16, 2026Updated last month
- avarehelper☆12Aug 15, 2021Updated 4 years ago
- C++ Code☆11Aug 13, 2019Updated 6 years ago
- POC of sudo password stealer☆36Feb 10, 2021Updated 5 years ago
- Android lockscreen password cracker via ADB (Tested only on Asus Zenfone 4 A450CG )☆10Jul 3, 2017Updated 8 years ago
- Repository of now harmless TREZOR security exploits☆11Jun 14, 2015Updated 10 years ago
- Source files to keep https://dontvacuum.me/robotinfo/ up-to-date☆14Oct 2, 2024Updated last year
- Common Proprietary Qualcomm Binaries☆10Dec 26, 2016Updated 9 years ago
- This simple SMB vulnerability MS17-010 scanner is developed to help security professionals to quickly check if a computer is vulnerable t…☆10Jul 24, 2017Updated 8 years ago