sgxgsx / bluekitLinks
Bluekit is an extensible engine, CLI tool used in BlueToolkit
☆13Updated last month
Alternatives and similar repositories for bluekit
Users that are interested in bluekit are comparing it to the libraries listed below
Sorting:
- Directory with Bluetooth exploits that is used in BlueToolkit☆17Updated last month
- Discover Non-Discoverable Bluetooth Classic devices☆13Updated last year
- Monitor 802.11 probe requests from a capture file or network sniffing!☆33Updated 9 months ago
- Rubber Ducky powered by NeoKey☆27Updated last year
- 🎥 Spytruder: Advanced RTSP Camera Discovery and Vulnerability Assessment Tool☆20Updated 4 months ago
- mapAccountHijack is a tool designed to carry out a MAP Account hijack attack, which exploits the Message Access Profile (MAP) in Bluetoot…☆56Updated 9 months ago
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆19Updated 2 years ago
- Our fork of Iceman's fork for Proxmark III☆17Updated 11 months ago
- Covert data exfiltration and detection using 802.11 beacon stuffing☆17Updated 6 years ago
- Legba recipes.☆51Updated last year
- karma WiFi attack implementation☆54Updated last year
- ☆13Updated 8 months ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Updated last year
- Modular framework to exploit UPS devices☆66Updated 2 years ago
- A wrapper around the Proxmark3 client that will alert the user of specific events☆30Updated 4 years ago
- zyxel_ipc_camera_pwn☆20Updated 2 years ago
- One BadUSB to rule them all using ATmega32U4☆23Updated 5 years ago
- This tool is useful in case you want to evade the detection based on simple rules when trying to dump the SAM, SYSTEM or SECURITY hives u…☆10Updated 3 years ago
- Force target victim to unsafe network☆29Updated 5 months ago
- hiding in plain sight: part 2☆45Updated last year
- Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTC☆64Updated 2 years ago
- This repository is to provide a write-up and PoC for CVE-2023-41717.☆12Updated 2 years ago
- CrackerJack / Hashcat Web Interface / Context Information Security☆61Updated 6 months ago
- Find open databases - Powered by Binaryedge.io☆14Updated 5 years ago
- Bluetooth Security Assessment Methodology☆138Updated last year
- A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrator…☆14Updated 6 years ago
- Bash Recon Scan - Recon and Scan a network using Bash☆30Updated 3 years ago
- Automate All Pivoting System Enumeration with this Bash Script☆13Updated 3 years ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆18Updated 3 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆19Updated 3 years ago