sgxgsx / bluekitLinks
Bluekit is an extensible engine, CLI tool used in BlueToolkit
☆12Updated 2 weeks ago
Alternatives and similar repositories for bluekit
Users that are interested in bluekit are comparing it to the libraries listed below
Sorting:
- Directory with Bluetooth exploits that is used in BlueToolkit☆16Updated last week
- Discover Non-Discoverable Bluetooth Classic devices☆12Updated last year
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆18Updated 2 years ago
- Covert data exfiltration and detection using 802.11 beacon stuffing☆17Updated 6 years ago
- Legba recipes.☆49Updated last year
- The results of my small term paper on the topic of the Internet of Vulnerable Things and the exploit for CVE-2022-48194.☆16Updated 2 years ago
- mapAccountHijack is a tool designed to carry out a MAP Account hijack attack, which exploits the Message Access Profile (MAP) in Bluetoot…☆56Updated 8 months ago
- Force target victim to unsafe network☆26Updated 4 months ago
- Exploits of different CVE IDs (CVE-2021-37910, CVE-2021-40288, CVE-2021-41435, CVE-2021-41436, CVE-2021-41437, CVE-2021-41441, CVE-2021-4…☆17Updated 2 years ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Updated last year
- ☆13Updated 6 months ago
- Bluetooth Security Assessment Methodology☆135Updated last year
- Monitor 802.11 probe requests from a capture file or network sniffing!☆32Updated 7 months ago
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions☆17Updated 3 years ago
- Basics on commands/tools/info on how to do binary exploitation on a mobile phone☆56Updated 2 years ago
- Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTC☆62Updated 2 years ago
- Private keys that have become public ...☆20Updated 3 years ago
- The Multi-Protocol Swiss-Army-Knife for Hardware Hackers (UART/JTAG/SPI/I2C)☆81Updated 11 months ago
- 🎥 Spytruder: Advanced RTSP Camera Discovery and Vulnerability Assessment Tool☆19Updated 3 months ago
- A wrapper around the Proxmark3 client that will alert the user of specific events☆30Updated 4 years ago
- ☆24Updated 2 years ago
- Table of common WiFi router SSIDs with their corresponding router model, WPA key examples, keyspace, format and default web interface cre…☆14Updated 3 years ago
- Android App Pin Security Issue Allowing Unauthorized Payments via Google Wallet☆73Updated last year
- Our fork of Iceman's fork for Proxmark III☆17Updated 9 months ago
- karma WiFi attack implementation☆53Updated 11 months ago
- Rubber Ducky powered by NeoKey☆27Updated last year
- Guide for USBNinja☆47Updated 6 years ago
- A tool capable of bypassing easy root detection mechanisms by patching applications automatically (without frida).☆34Updated last year
- zyxel_ipc_camera_pwn☆20Updated 2 years ago
- A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrator…☆14Updated 6 years ago