sgxgsx / bluetoothexploitsLinks
Directory with Bluetooth exploits that is used in BlueToolkit
☆16Updated 2 months ago
Alternatives and similar repositories for bluetoothexploits
Users that are interested in bluetoothexploits are comparing it to the libraries listed below
Sorting:
- Bluekit is an extensible engine, CLI tool used in BlueToolkit☆12Updated 3 months ago
- Rubber Ducky powered by NeoKey☆27Updated last year
- ☆13Updated 5 months ago
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions☆17Updated 3 years ago
- BunnyLogger is a BashBunny payload that uses PowerShell to log keystroke☆17Updated 3 years ago
- Remove Offensive and Profane Words from Wordlists☆15Updated 2 years ago
- Legba recipes.☆50Updated last year
- Lucifer is a RAT (Remote Administrator Trojan) Generator for Windows/Linux systems written in Python.☆22Updated 3 years ago
- Just a better dirbuster☆13Updated 2 years ago
- Tool to use Nmap, in Flask with different types of scans. 👁☆12Updated this week
- The purpose of this tool is to collect all the subdomains using different subdomain finder tools and then filter out those subdomains whi…☆16Updated 2 years ago
- Tools for attacking various MIFARE RFID cards☆15Updated 6 years ago
- Covert data exfiltration and detection using 802.11 beacon stuffing☆17Updated 6 years ago
- Gain A Meterpreter Shell With A BadUSB Attack In Less Than 5 Seconds.☆16Updated 3 years ago
- Phishable is a project that logs misconfigured DNS that can be exploited to conduct phishing attacks & spoof domains. Phishable helps org…☆22Updated 2 years ago
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆18Updated 2 years ago
- CloudDefense.ai is an automated web application security testing tool that audits your web applications by checking for vulnerabilities l…☆49Updated 7 months ago
- All Type Of Tools written in multipule language .☆21Updated 2 years ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆18Updated 3 years ago
- BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy [CVE-2020-15802] [CVE-2022-20361]☆19Updated 3 years ago
- mapAccountHijack is a tool designed to carry out a MAP Account hijack attack, which exploits the Message Access Profile (MAP) in Bluetoot…☆54Updated 7 months ago
- Evil maid attacks are the biggest threat to full disk encryption, if you can't provide 100% physical security. It's not about locking you…☆11Updated 9 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- Burp suite Certificate modification tool☆18Updated 2 years ago
- Repository of tools used in my blog☆52Updated last year
- An Open Source Intelligence Framework to investigate and keep track of the investigation of a certain individual☆16Updated 2 years ago
- crawl a website for links and expose all the vulnerable parameters.☆13Updated 2 years ago
- Social Engineering Attack Using Phishing in a Local Area Wi-Fi by Creating an Access Point and DNS Manipulation☆14Updated 3 years ago
- Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more☆49Updated 10 months ago
- This tool will help in generating reverse shells easily for all types of OS.☆20Updated 2 years ago