Scan/Exploit Blueborne CVE-2017-0785
☆31Feb 28, 2018Updated 8 years ago
Alternatives and similar repositories for blueborne
Users that are interested in blueborne are comparing it to the libraries listed below
Sorting:
- Bluetooth scanner for local devices that may be vulnerable to Blueborne exploit☆160Sep 18, 2017Updated 8 years ago
- Blueborne CVE-2017-1000251 PoC for linux machines☆17Mar 10, 2023Updated 3 years ago
- Exploit for Mass Remote Code Execution on GPON home routers (CVE-2018-10562) obtained from Shodan.☆24May 26, 2018Updated 7 years ago
- CVE-2017-0785 BlueBorne PoC☆39Sep 22, 2017Updated 8 years ago
- CVE-2018-11311 | mySCADA myPRO 7 Hardcoded FTP Username and Password Vulnerability☆12Jul 2, 2018Updated 7 years ago
- Purpose only! The dangers of Bluetooth implementations: Unveiling zero day vulnerabilities and security flaws in …☆284Aug 23, 2021Updated 4 years ago
- Blueborne CVE-2017-0785 Android information leak vulnerability☆472Sep 23, 2017Updated 8 years ago
- like hacking, this is a brutefore for DVR - camara HIKVision☆17Sep 2, 2017Updated 8 years ago
- Pcaps for PeddleCheap and implant communication + script for interpreting and decrypting pcaps.☆17Nov 29, 2017Updated 8 years ago
- MIRROR☆16Jun 20, 2018Updated 7 years ago
- Firmware analysis website + API☆43Oct 1, 2020Updated 5 years ago
- 这是一个从黑暗搜索引擎 搜索查找存在此反序列化漏洞 的批量检测脚本☆11Feb 23, 2023Updated 3 years ago
- This python/jython script is used as plugin to BinNavi tool to analyze a x86 binanry file to find buffer overflow prone functions. Such f…☆29Jan 8, 2013Updated 13 years ago
- Thunderclap QEMU-based network card emulation☆30Oct 3, 2022Updated 3 years ago
- exploit vulnerable c/c++ programms with buffer overflow attacks☆24Jul 18, 2022Updated 3 years ago
- A brief analysis of the BlueBorne Vulnerability Scanner app by Armis☆24Sep 14, 2017Updated 8 years ago
- PoC scripts demonstrating the BlueBorne vulnerabilities☆611May 17, 2021Updated 4 years ago
- DVR-Exploiter a Bash Script Program Exploit The DVR's Based on CVE-2018-9995☆112Oct 11, 2018Updated 7 years ago
- An exploit for Microsoft IIS 6.0 CVE-2017-7269☆22Mar 29, 2017Updated 8 years ago
- ☆27Nov 4, 2015Updated 10 years ago
- Check All APK's -- scripts for checking your phone for malware☆30Aug 8, 2017Updated 8 years ago
- Bootkit for Windows 7☆27Jun 29, 2014Updated 11 years ago
- Thunderclap hardware for Intel Arria 10 FPGA☆34May 21, 2019Updated 6 years ago
- A Webkit RCE exploit and an SBX bug☆34Jun 8, 2019Updated 6 years ago
- ☆14Jan 16, 2026Updated last month
- ☆10Nov 24, 2018Updated 7 years ago
- Ingest Nessus files into Elasticsearch using PowerShell!☆17Nov 14, 2025Updated 3 months ago
- From Dork to Download: Automating Google Dorks with Playwright☆41Mar 1, 2026Updated last week
- avarehelper☆12Aug 15, 2021Updated 4 years ago
- A dummy TCP client and server application.☆11Nov 16, 2021Updated 4 years ago
- Chequea si tu firewall es vulnerable a CVE-2024-21762 (RCE sin autenticación)☆15Jun 29, 2025Updated 8 months ago
- Merge sort correctness proof☆11May 21, 2015Updated 10 years ago
- A quantum enhanced, totaly private encryption app that uses true random key generation from zero point energy.☆13Jul 2, 2025Updated 8 months ago
- TG 2016 hacking compo repo☆10Mar 31, 2016Updated 9 years ago
- ☆10Oct 24, 2020Updated 5 years ago
- Common Proprietary Qualcomm Binaries☆10Dec 26, 2016Updated 9 years ago
- This script checks visa application status using idata.com.tr services in Turkey (for Germany and Italy) and notifies OSX Notification Ce…☆11Jul 9, 2015Updated 10 years ago
- The 9esim mini tool is a external (or we called extension) LPA on a board, which based on ESP32S3.☆13Dec 19, 2024Updated last year
- Repository of now harmless TREZOR security exploits☆11Jun 14, 2015Updated 10 years ago