sgxgsx / bluekitLinks
Bluekit is an extensible engine, CLI tool used in BlueToolkit
☆13Updated last month
Alternatives and similar repositories for bluekit
Users that are interested in bluekit are comparing it to the libraries listed below
Sorting:
- Directory with Bluetooth exploits that is used in BlueToolkit☆17Updated last month
- Discover Non-Discoverable Bluetooth Classic devices☆13Updated last year
- Covert data exfiltration and detection using 802.11 beacon stuffing☆17Updated 6 years ago
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆19Updated 2 years ago
- Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTC☆63Updated 2 years ago
- Legba recipes.☆51Updated last year
- Our fork of Iceman's fork for Proxmark III☆17Updated 10 months ago
- Force target victim to unsafe network☆29Updated 4 months ago
- mapAccountHijack is a tool designed to carry out a MAP Account hijack attack, which exploits the Message Access Profile (MAP) in Bluetoot…☆57Updated 8 months ago
- Guide for USBNinja☆47Updated 6 years ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆18Updated 3 years ago
- ☆13Updated 7 months ago
- Table of common WiFi router SSIDs with their corresponding router model, WPA key examples, keyspace, format and default web interface cre…☆14Updated 3 years ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Updated last year
- Rubber Ducky powered by NeoKey☆26Updated last year
- Monitor 802.11 probe requests from a capture file or network sniffing!☆32Updated 8 months ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions☆17Updated 3 years ago
- This tool is useful in case you want to evade the detection based on simple rules when trying to dump the SAM, SYSTEM or SECURITY hives u…☆10Updated 3 years ago
- karma WiFi attack implementation☆53Updated last year
- Basics on commands/tools/info on how to do binary exploitation on a mobile phone☆56Updated 2 years ago
- zyxel_ipc_camera_pwn☆20Updated 2 years ago
- Session scripts.☆49Updated 3 years ago
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆14Updated 9 years ago
- Phishable is a project that logs misconfigured DNS that can be exploited to conduct phishing attacks & spoof domains. Phishable helps org…☆22Updated 2 years ago
- Bash Recon Scan - Recon and Scan a network using Bash☆30Updated 3 years ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆23Updated last year
- BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy [CVE-2020-15802] [CVE-2022-20361]☆19Updated 3 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆36Updated last month
- A tool designed for penetration testers to perform attacks on LAN and WLAN networks, including network discovery, exploitation, and NAC b…☆42Updated 3 months ago