Directory with Bluetooth exploits that is used in BlueToolkit
☆22Sep 30, 2025Updated 5 months ago
Alternatives and similar repositories for bluetoothexploits
Users that are interested in bluetoothexploits are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Bluekit is an extensible engine, CLI tool used in BlueToolkit☆17Sep 25, 2025Updated 6 months ago
- A tool which perform deauthentication attack on unpaired bluetooth devices.☆52Aug 30, 2025Updated 6 months ago
- Explore the realm of Bluetooth Penetration Testing through our comprehensive website. Learn about different techniques, tools, and best p…☆27Aug 28, 2024Updated last year
- BlueToolkit is an extensible Bluetooth Classic vulnerability testing framework that helps uncover new and old vulnerabilities in Bluetoo…☆671Mar 5, 2026Updated 3 weeks ago
- Bluebugger☆31Jun 19, 2025Updated 9 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Herramienta orientada a pentesting en la zona bluetooth.☆22Jun 26, 2024Updated last year
- Remove Offensive and Profane Words from Wordlists☆15Jul 27, 2023Updated 2 years ago
- Putting the C2 in C2loudflare☆18Jun 28, 2024Updated last year
- Tools used to extract Flash memory from locked MPC5566 (Hardwear.io 2025 talk)☆20May 30, 2025Updated 10 months ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- **DarkSec NIGHTBLADE** is an advanced USB Army Knife exploitation framework designed for professional penetration testers and red team op…☆31Nov 6, 2025Updated 4 months ago
- [Under Development] This is a modification to the Ubertooth One firmware developed by Great Scott Gadgets. The modified firmware is able …☆22Feb 22, 2022Updated 4 years ago
- ☆17Jul 20, 2018Updated 7 years ago
- A BLE-controlled USB Rubber Ducky clone built with ESP32-S3 boards.☆22Jan 17, 2026Updated 2 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Seven different DLL injection techniques in one single project.☆12May 19, 2020Updated 5 years ago
- ☆18Jun 25, 2024Updated last year
- Tool CTF Forensik File extract/convert☆15Mar 22, 2024Updated 2 years ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆24Oct 23, 2021Updated 4 years ago
- IP Tracking☆10Jul 1, 2019Updated 6 years ago
- This is ultrasonic pest repellent device for bugs based on ATTINY85, resistors and PAM4803 amplifier with set of 40kHz ultrasonic transd…☆18Aug 17, 2025Updated 7 months ago
- OverburstC2 is a C2 (Command and Control) written in Python and C, designed to manage malware that conducts large-scale DDoS attacks☆28Jan 18, 2026Updated 2 months ago
- Turn your ESP32 into a Bluetooth Rubber Ducky - It allows your ESP32 board to function as a wireless input device☆31Nov 26, 2025Updated 4 months ago
- Command-line tool to identify useragents that bypasses proxy restrictions☆13Oct 23, 2025Updated 5 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- C++ Bluetooth snoop file streaming decoder☆37Dec 25, 2016Updated 9 years ago
- Legacy version of binary hashcat for Linux (64 bits). Used on airgeddon docker container.☆19Mar 30, 2017Updated 8 years ago
- Hardened your Windows OS against forensics analysis☆25Nov 27, 2024Updated last year
- Versatile tool for managing wordlists☆11Jul 15, 2021Updated 4 years ago
- List of some really cool websites☆12Mar 14, 2026Updated 2 weeks ago
- How to Get Free Coins and Keys in Arcana OCTOBER 12, 2018 LENCIPETA UNCATEGORIZED How to cheat in The Arcana: A Mystic Romance on iOS/An…☆14Feb 15, 2019Updated 7 years ago
- An experimental dynamic malware unpacker based on Intel Pin and PE-sieve☆63Aug 21, 2024Updated last year
- Rasta's mouse AMSI patch but with function that makes it undetectable.☆14Apr 21, 2021Updated 4 years ago
- A captive portal for ESP32☆19Dec 25, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Allows invisible Payloads to be decoded and encoded.☆28Mar 5, 2024Updated 2 years ago
- Quickly generate every payload type for each listener and optionally host via HTTP.☆22Aug 23, 2021Updated 4 years ago
- hashgen - the blazingly fast hash generator☆40Mar 12, 2026Updated 2 weeks ago
- ☆10Jul 3, 2021Updated 4 years ago
- MadSpam is a Spammer tool which is used to spam. This tool is very easy to use.☆13Dec 18, 2020Updated 5 years ago
- Fuzzing All Native Android System Services with Interface Awareness and Coverage☆37Sep 8, 2025Updated 6 months ago
- Automated Password Cracking Tool☆17Dec 19, 2020Updated 5 years ago