Identifies Bluetooth Low-energy devices
☆16Jul 26, 2020Updated 5 years ago
Alternatives and similar repositories for bluetoothid
Users that are interested in bluetoothid are comparing it to the libraries listed below
Sorting:
- Prototype program to decode a video file looking for exploits/malware.☆17Jul 26, 2020Updated 5 years ago
- Nmap - the Network Mapper. Github mirror of official SVN repository.☆10Sep 5, 2018Updated 7 years ago
- A lightweight/secure honeypot using Lua scripts.☆26Mar 5, 2021Updated 4 years ago
- Parses DNS responses in a secure, rigorous manner☆22Jul 24, 2020Updated 5 years ago
- A non-math, but still technical, guide to cryptography☆24Jul 24, 2020Updated 5 years ago
- A continuation of my 'ferret' project that extracts useful information from networks.☆23Jul 20, 2014Updated 11 years ago
- Recording default/backdoor passwords from IoT devices I come across☆38Oct 27, 2016Updated 9 years ago
- A simple implementation of an 'echo' (port 7) server using epoll (Linux), kqueue (FreeBSD), and IOCompletionPorts (Windows).☆14Nov 19, 2018Updated 7 years ago
- Roblox-Xeno is a custom game server for the popular online gaming platform Roblox, offering enhanced gameplay features and exclusive cont…☆21Feb 19, 2026Updated last week
- A bunch of library code that can easily be included in new/prototype projects with few (usually zero) dependencies, even on themselves.☆12Jul 26, 2020Updated 5 years ago
- Get random bytes from the TPM (tool + BCrypt RNG provider)☆17Nov 3, 2020Updated 5 years ago
- ☆13Sep 30, 2020Updated 5 years ago
- A packet-sniffer for 10gig networks that writes to compressed files. I created this because☆27Jun 21, 2017Updated 8 years ago
- Logs incoming attempts to connect to NetBIOS/SMB☆14May 15, 2017Updated 8 years ago
- The Monty Hall problem, in JavaScript☆13Oct 1, 2017Updated 8 years ago
- Brainfuck architecture module and loader for Binary Ninja☆20Jan 13, 2026Updated last month
- ☆12Nov 9, 2017Updated 8 years ago
- WAF Exploitation Framework☆13Aug 25, 2023Updated 2 years ago
- Open source SDR LTE software suite☆19Jan 11, 2018Updated 8 years ago
- Helping my friend with her economics research project by scraping drug information from DarkWeb using selenium and Tor☆18Mar 12, 2020Updated 5 years ago
- PoC exploit for CVE-2015-5477 BIND9 TKEY assertion failure☆65Aug 1, 2015Updated 10 years ago
- Random stuff☆16Jun 28, 2018Updated 7 years ago
- This aims to be a collection of tools to forensically analyze Active Directory databases☆25Jun 11, 2025Updated 8 months ago
- A proxy server for cookie sidejacking. Works with 'ferret'.☆56May 18, 2016Updated 9 years ago
- WhatsApp end-to-end media decryptor☆94Mar 3, 2023Updated 2 years ago
- A Discourse theme component that generates a table of contents for topics with one click☆26Feb 17, 2026Updated last week
- Simple examples of integrating the Lua scripting language into C programs.☆24Nov 26, 2018Updated 7 years ago
- Cross-platform malware development library for anti-analysis techniques☆25Jul 27, 2021Updated 4 years ago
- All transmit and receive files for the HackRF and HackRF Blue☆23Dec 7, 2015Updated 10 years ago
- A Python based backdoor that uses Steganography and a Cloud Image Service as a command and control server.☆26Sep 2, 2016Updated 9 years ago
- Discusses how to verify DKIM signatures in old emails, namely one of the Hunter Biden emails in the news☆102Oct 17, 2022Updated 3 years ago
- ☆12May 13, 2020Updated 5 years ago
- Windows registry samples☆24Nov 18, 2018Updated 7 years ago
- Web-based WiFi monitor☆68Oct 18, 2022Updated 3 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- Python Script for SAML2 Authentication Passwordspray☆41Jul 5, 2023Updated 2 years ago
- Network sinkhole for isolated malware analysis☆40Mar 5, 2018Updated 7 years ago
- Linux install and network setup for SNAPS☆14Sep 7, 2019Updated 6 years ago
- This is a mini-firewall that completely isolates a target device from the local network.☆309Nov 11, 2013Updated 12 years ago