sgxgsx / bluekit
Bluekit is an extensible engine, CLI tool used in BlueToolkit
☆10Updated last month
Alternatives and similar repositories for bluekit:
Users that are interested in bluekit are comparing it to the libraries listed below
- Directory with Bluetooth exploits that is used in BlueToolkit☆11Updated last month
- BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy [CVE-2020-15802] [CVE-2022-20361]☆19Updated 2 years ago
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆18Updated 2 years ago
- Monitor 802.11 probe requests from a capture file or network sniffing!☆31Updated last month
- Proof of Concept for CVE-2023-22906☆7Updated last year
- ☆13Updated 7 months ago
- Force target victim to unsafe network☆19Updated last week
- The results of my small term paper on the topic of the Internet of Vulnerable Things and the exploit for CVE-2022-48194.☆15Updated 2 years ago
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13Updated 10 months ago
- Rubber Ducky powered by NeoKey☆22Updated 9 months ago
- mapAccountHijack is a tool designed to carry out a MAP Account hijack attack, which exploits the Message Access Profile (MAP) in Bluetoot…☆43Updated last month
- Table of common WiFi router SSIDs with their corresponding router model, WPA key examples, keyspace, format and default web interface cre…☆11Updated 3 years ago
- Flash-BASH is a Raspberry Pi based tool that uses a multiplexer to "glitch" a target device into a privileged open state.☆25Updated 3 years ago
- Obtain handshakes from networks out of your range!☆28Updated 3 years ago
- ☆14Updated 5 months ago
- DEFCON 30 Car Hacking Village Presentation☆10Updated 2 years ago
- zyxel_ipc_camera_pwn☆20Updated 2 years ago
- Simulator forked from ICSim used during Car Hacking Workshops☆15Updated 6 months ago
- A vehicle network analysis and attack tool.☆17Updated last year
- Covert data exfiltration and detection using 802.11 beacon stuffing☆15Updated 5 years ago
- Packet injection for wifi; simplified.☆37Updated 2 years ago
- An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.☆14Updated 10 months ago
- karma WiFi attack implementation☆48Updated 5 months ago
- This repository contains a set of InternalBlue patches for the BCM4375B1 Bluetooth controller, allowing to sniff and inject Zigbee, Mosar…☆21Updated 3 years ago
- ☆13Updated last week
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆39Updated last year
- A tool in Python used with the Yardstick One to perform replay and rolling code attacks, specifically on cars.☆15Updated 4 years ago
- Exploits of different CVE IDs (CVE-2021-37910, CVE-2021-40288, CVE-2021-41435, CVE-2021-41436, CVE-2021-41437, CVE-2021-41441, CVE-2021-4…☆17Updated 2 years ago
- Ded Security Framework is a tool aimed at security professionals☆34Updated 10 months ago
- ST25TB / SRx NFC Emulator / Initiator - kameleon - based on TI TRF7970A with MSP430☆12Updated 7 months ago