sgxgsx / bluetoothexploits
Directory with Bluetooth exploits that is used in BlueToolkit
☆10Updated last month
Related projects ⓘ
Alternatives and complementary repositories for bluetoothexploits
- Rubber Ducky powered by NeoKey☆20Updated 5 months ago
- ☆13Updated last year
- An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.☆14Updated 6 months ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated 7 months ago
- This is a simple Python script that connects to a MISP instance and retrieves attributes of specific types (such as IP addresses, URLs, a…☆16Updated last year
- An Open Source Intelligence Framework to investigate and keep track of the investigation of a certain individual☆14Updated last year
- The Network Execution Tool☆13Updated 7 months ago
- Pentesting Suite☆16Updated 5 months ago
- NetFuzzer is a comprehensive network security assessment tool for internal and external networks, including Firewalls, Routers, Switches,…☆13Updated 4 months ago
- mapAccountHijack is a tool designed to carry out a MAP Account hijack attack, which exploits the Message Access Profile (MAP) in Bluetoot…☆29Updated 2 months ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆13Updated 2 years ago
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆19Updated last year
- Bash tool used for proactive detection of malicious activity on macOS systems.☆34Updated last year
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆11Updated last year
- ☆28Updated last year
- Remove Offensive and Profane Words from Wordlists☆14Updated last year
- Automate All Pivoting System Enumeration with this Bash Script☆11Updated 2 years ago
- Python Penetration Testing Tools☆17Updated last year
- Phunter is an osint tool allowing you to find various information via a phone number 🔎📞☆14Updated 7 months ago
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆31Updated 2 years ago
- The Kill-The-Code Python Program provides a robust mechanism for remotely controlling code execution by monitoring a specified URL for a …☆13Updated 3 months ago
- Legba recipes.☆41Updated 3 months ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7Updated 2 years ago
- Enumeration & fingerprint tool☆23Updated 8 months ago
- Nexus of Android banking Trojans☆15Updated last year
- MacroExploit use in excel sheet☆20Updated last year
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆14Updated 3 years ago
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆27Updated last year
- Find open databases - Powered by Binaryedge.io☆12Updated 4 years ago