sgxgsx / bluetoothexploitsLinks
Directory with Bluetooth exploits that is used in BlueToolkit
☆20Updated 4 months ago
Alternatives and similar repositories for bluetoothexploits
Users that are interested in bluetoothexploits are comparing it to the libraries listed below
Sorting:
- Bluekit is an extensible engine, CLI tool used in BlueToolkit☆16Updated 4 months ago
- Rubber Ducky powered by NeoKey☆28Updated last year
- mapAccountHijack is a tool designed to carry out a MAP Account hijack attack, which exploits the Message Access Profile (MAP) in Bluetoot…☆65Updated 11 months ago
- Covert data exfiltration and detection using 802.11 beacon stuffing☆16Updated 6 years ago
- [Under Development] This is a modification to the Ubertooth One firmware developed by Great Scott Gadgets. The modified firmware is able …☆22Updated 3 years ago
- BunnyLogger is a BashBunny payload that uses PowerShell to log keystroke☆16Updated 3 years ago
- BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy [CVE-2020-15802] [CVE-2022-20361]☆19Updated 3 years ago
- Make your own rubber ducky USB with VBScript and execute any commands you want!☆45Updated 8 months ago
- Basics on commands/tools/info on how to do binary exploitation on a mobile phone☆56Updated 2 years ago
- Generate HID attack strings for Kali Nethunter☆12Updated 10 years ago
- A Jupyter Notebook Program To Visualize Your WiGLE Wardriving Data☆18Updated 4 years ago
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆17Updated last year
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions☆17Updated 3 years ago
- An Open Source Intelligence Framework to investigate and keep track of the investigation of a certain individual☆16Updated 2 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Updated 3 years ago
- Packet injection for wifi; simplified.☆38Updated 3 years ago
- Automated Pentest Recon Scanner☆14Updated 8 years ago
- Ded Security Framework is a tool aimed at security professionals☆35Updated last year
- Malwarekid python BadUSB payload encoder for generating powershell script in bas64☆22Updated last year
- Basics on commands/tools/info on how to do a forensic analysis of a mobile phone☆30Updated 2 years ago
- Damn Small SQLi Scanner. (DSSS)☆15Updated 8 years ago
- A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrator…☆15Updated 7 years ago
- Python tool to detect critical information (passwords, usernames, strings connectios, etc) in public repositories. GITHUB Hacking.☆22Updated 4 years ago
- Discover Non-Discoverable Bluetooth Classic devices☆13Updated last year
- ☆12Updated 2 weeks ago
- simple script to pwn android phone with physical access☆27Updated 7 years ago
- 🗺 A map of OSINT tools.☆19Updated 2 years ago
- Just a better dirbuster☆13Updated 3 years ago
- Hack Windows with FUD backdoor/payload, Escalates LINUX privileges, Devastate Linux, Tunnel forwarding☆15Updated 5 years ago
- This tool allows you to get the approximate location of a Bluetooth device using the long-awaited: Wigle.net API.☆36Updated 2 years ago