Scan/Exploit Blueborne CVE-2017-0785
☆31Feb 28, 2018Updated 8 years ago
Alternatives and similar repositories for blueborne
Users that are interested in blueborne are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Blueborne CVE-2017-1000251 PoC for linux machines☆17Mar 10, 2023Updated 3 years ago
- Bluetooth scanner for local devices that may be vulnerable to Blueborne exploit☆160Sep 18, 2017Updated 8 years ago
- Blueborne CVE-2017-0785 Android information leak vulnerability☆469Sep 23, 2017Updated 8 years ago
- Purpose only! The dangers of Bluetooth implementations: Unveiling zero day vulnerabilities and security flaws in …☆284Aug 23, 2021Updated 4 years ago
- Exploit for Mass Remote Code Execution on GPON home routers (CVE-2018-10562) obtained from Shodan.☆24May 26, 2018Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Exploiting cameras with a very distinctive HTTP Server header of "JAWS/1.0".☆10Jan 11, 2023Updated 3 years ago
- The dangers of Bluetooth implementations: Unveiling zero day vulnerabilities and security flaws in modern Bluetooth stacks.☆36Sep 30, 2024Updated last year
- CVE-2017-0785 BlueBorne PoC☆39Sep 22, 2017Updated 8 years ago
- Linux Distro for Mobile Security, Malware Analysis, and Forensics☆16Jul 13, 2015Updated 10 years ago
- like hacking, this is a brutefore for DVR - camara HIKVision☆17Sep 2, 2017Updated 8 years ago
- Docker container to run PoisonTap☆15Dec 8, 2016Updated 9 years ago
- PoC scripts demonstrating the BlueBorne vulnerabilities☆611May 17, 2021Updated 4 years ago
- MIRROR☆16Jun 20, 2018Updated 7 years ago
- Lua compiled for Android platform☆12Sep 28, 2018Updated 7 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Firmware analysis website + API☆43Oct 1, 2020Updated 5 years ago
- ☆27Nov 4, 2015Updated 10 years ago
- ☆21Mar 23, 2026Updated last week
- Fiddler2 Plugin for AMF format parsing☆14May 9, 2016Updated 9 years ago
- Blueborne CVE-2017-0781 Android heap overflow vulnerability☆144Jul 29, 2021Updated 4 years ago
- Android平台编译SDL2☆11Jun 20, 2017Updated 8 years ago
- Bootkit for Windows 7☆27Jun 29, 2014Updated 11 years ago
- C++ Code☆11Aug 13, 2019Updated 6 years ago
- web information gathering / Grab links☆45Nov 1, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Add SSL config to nginx☆64Jan 5, 2018Updated 8 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's Don't Forget Your Base release. Contains Equation group's collection of tools primar…☆18Jan 29, 2018Updated 8 years ago
- Juniper backdoor☆14Dec 24, 2015Updated 10 years ago
- Leaked Mirai Source Code for Research/IoC Development Purposes☆16Oct 31, 2016Updated 9 years ago
- Scripts and other goodies from the pwnieexpress project ported☆10Mar 16, 2014Updated 12 years ago
- Proof of Concept for CVE-2018-11776☆21Sep 12, 2018Updated 7 years ago
- PhonePe PHP Merchant Client Library☆10Apr 26, 2017Updated 8 years ago
- pinata-csrf-tool☆13Dec 20, 2019Updated 6 years ago
- Pcaps for PeddleCheap and implant communication + script for interpreting and decrypting pcaps.☆17Nov 29, 2017Updated 8 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Unauthenticated RCE at Woody Ad Snippets / CVE-2019-15858 (PoC)☆32Apr 25, 2023Updated 2 years ago
- pinky - The PHP mini RAT (Remote Administration Tool)☆77Sep 7, 2018Updated 7 years ago
- CSR2F is a Python tool used for generating CSRF (Cross-Site Request Forgery) exploits☆13Aug 22, 2019Updated 6 years ago
- A simple reverse shell in Nim langauge. It should bypass AV-s (don't submit binaries)☆16Oct 10, 2019Updated 6 years ago
- UAC 0Day all day!☆57Aug 15, 2017Updated 8 years ago
- I updated the exploit code by Project Zero to gain root shell on iOS devices that I own. Deleted the previous repo and pushing in new one…☆13Dec 18, 2016Updated 9 years ago
- CCTV Camera scanner using the GoAhead webserver exploit☆20May 25, 2025Updated 10 months ago