sgxgsx / bluetoothexploitsLinks
Directory with Bluetooth exploits that is used in BlueToolkit
☆17Updated last month
Alternatives and similar repositories for bluetoothexploits
Users that are interested in bluetoothexploits are comparing it to the libraries listed below
Sorting:
- Bluekit is an extensible engine, CLI tool used in BlueToolkit☆13Updated last month
- BunnyLogger is a BashBunny payload that uses PowerShell to log keystroke☆17Updated 3 years ago
- Rubber Ducky powered by NeoKey☆27Updated last year
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions☆17Updated 3 years ago
- Tools for attacking various MIFARE RFID cards☆15Updated 6 years ago
- BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy [CVE-2020-15802] [CVE-2022-20361]☆19Updated 3 years ago
- ☆13Updated 7 months ago
- Legba recipes.☆51Updated last year
- Remove Offensive and Profane Words from Wordlists☆15Updated 2 years ago
- Discover Non-Discoverable Bluetooth Classic devices☆13Updated last year
- Subdomain crawler with wordlist using python☆12Updated 5 years ago
- Our fork of Iceman's fork for Proxmark III☆17Updated 11 months ago
- Gain A Meterpreter Shell With A BadUSB Attack In Less Than 5 Seconds.☆18Updated 3 years ago
- mapAccountHijack is a tool designed to carry out a MAP Account hijack attack, which exploits the Message Access Profile (MAP) in Bluetoot…☆56Updated 9 months ago
- A wrapper around the Proxmark3 client that will alert the user of specific events☆30Updated 4 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Updated 3 years ago
- This is automation tool which utilize 2 sub -domain finder and then sort out working sub-domain and finally scan for sub-doamin TAKEOVER.☆10Updated 2 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Updated 3 years ago
- Covert data exfiltration and detection using 802.11 beacon stuffing☆17Updated 6 years ago
- Monitor 802.11 probe requests from a capture file or network sniffing!☆33Updated 9 months ago
- An Open Source Intelligence Framework to investigate and keep track of the investigation of a certain individual☆16Updated 2 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆19Updated 3 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆35Updated 4 years ago
- Just a better dirbuster☆13Updated 2 years ago
- This tool will help in generating reverse shells easily for all types of OS.☆20Updated 2 years ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆18Updated 3 years ago
- 🎥 Spytruder: Advanced RTSP Camera Discovery and Vulnerability Assessment Tool☆20Updated 4 months ago
- Tool to use Nmap, in Flask with different types of scans. 👁☆14Updated 2 months ago
- Basics on commands/tools/info on how to do binary exploitation on a mobile phone☆56Updated 2 years ago