sgxgsx / bluekit
Bluekit is an extensible engine, CLI tool used in BlueToolkit
☆11Updated 3 months ago
Alternatives and similar repositories for bluekit:
Users that are interested in bluekit are comparing it to the libraries listed below
- Directory with Bluetooth exploits that is used in BlueToolkit☆14Updated 3 months ago
- Force target victim to unsafe network☆20Updated last week
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆18Updated 2 years ago
- BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy [CVE-2020-15802] [CVE-2022-20361]☆19Updated 2 years ago
- Proof of Concept for CVE-2023-22906☆7Updated last year
- Rubber Ducky powered by NeoKey☆23Updated 11 months ago
- A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrator…☆14Updated 6 years ago
- Tools for attacking various MIFARE RFID cards☆15Updated 5 years ago
- Basics on commands/tools/info on how to do a forensic analysis of a mobile phone☆26Updated 2 years ago
- The results of my small term paper on the topic of the Internet of Vulnerable Things and the exploit for CVE-2022-48194.☆16Updated 2 years ago
- ☆14Updated last month
- mapAccountHijack is a tool designed to carry out a MAP Account hijack attack, which exploits the Message Access Profile (MAP) in Bluetoot…☆48Updated 3 months ago
- A folder to serve tools from during PT/Red Team engagements. Contains common executables and scripts for privesc, recon, pivoting and CVE…☆14Updated last year
- Our fork of Iceman's fork for Proxmark III☆16Updated 4 months ago
- Monitor 802.11 probe requests from a capture file or network sniffing!☆31Updated 2 months ago
- Legba recipes.☆49Updated 8 months ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆37Updated 2 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆15Updated 7 years ago
- This tool is useful in case you want to evade the detection based on simple rules when trying to dump the SAM, SYSTEM or SECURITY hives u…☆10Updated 2 years ago
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13Updated 11 months ago
- A PowerShell script that simplifies life and therefore... phishing.☆19Updated 2 years ago
- karma WiFi attack implementation☆49Updated 6 months ago
- ☆26Updated 2 years ago
- Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTC☆60Updated last year
- Basics on commands/tools/info on how to do binary exploitation on a mobile phone☆51Updated 2 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆18Updated 2 years ago
- Covert data exfiltration and detection using 802.11 beacon stuffing☆15Updated 5 years ago
- Nexus of Android banking Trojans☆15Updated last year
- A wrapper around the Proxmark3 client that will alert the user of specific events☆30Updated 4 years ago
- Packet injection for wifi; simplified.☆36Updated 2 years ago