sgxgsx / bluetoothexploitsLinks
Directory with Bluetooth exploits that is used in BlueToolkit
☆15Updated last week
Alternatives and similar repositories for bluetoothexploits
Users that are interested in bluetoothexploits are comparing it to the libraries listed below
Sorting:
- Bluekit is an extensible engine, CLI tool used in BlueToolkit☆11Updated last week
- An Open Source Intelligence Framework to investigate and keep track of the investigation of a certain individual☆15Updated last year
- Basics on commands/tools/info on how to do a forensic analysis of a mobile phone☆28Updated 2 years ago
- A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrator…☆14Updated 6 years ago
- mapAccountHijack is a tool designed to carry out a MAP Account hijack attack, which exploits the Message Access Profile (MAP) in Bluetoot…☆49Updated 4 months ago
- Rubber Ducky powered by NeoKey☆25Updated last year
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Updated 2 years ago
- BunnyLogger is a BashBunny payload that uses PowerShell to log keystroke☆17Updated 3 years ago
- Tools for attacking various MIFARE RFID cards☆15Updated 6 years ago
- Digispark 6-Digit PIN Brute Force attack for USB-OTG Android devices☆14Updated 7 months ago
- Powerful advanced web platform for C2 managing and automated penetration testing.☆15Updated last year
- Our fork of Iceman's fork for Proxmark III☆16Updated 6 months ago
- serve and destroy aka phisherprice lite is a multi functional pen testing script designed on parrot and kali now with windows support☆9Updated 3 months ago
- Find open databases - Powered by Binaryedge.io☆15Updated 5 years ago
- Repository of tools used in my blog☆51Updated last year
- Nexus of Android banking Trojans☆15Updated last year
- [Under Development] This is a modification to the Ubertooth One firmware developed by Great Scott Gadgets. The modified firmware is able …☆15Updated 3 years ago
- List of OSINT resources☆15Updated 4 years ago
- Tutorials for getting started with Pwntools☆12Updated 3 years ago
- Network sniffing automation with Bettercap as rogue AP or as client in your network☆25Updated 3 years ago
- Automated Pentest Recon Scanner☆14Updated 7 years ago
- Combined Worldlist from various projects Including Seclists, fuzzdb and other Database Management Tools☆18Updated 5 years ago
- A Jupyter Notebook Program To Visualize Your WiGLE Wardriving Data☆18Updated 3 years ago
- Single-Clich-Proxy-Chains☆9Updated 4 years ago
- Scripts and tool for iOS app reversing☆25Updated 3 years ago
- Hack Windows with FUD backdoor/payload, Escalates LINUX privileges, Devastate Linux, Tunnel forwarding☆15Updated 4 years ago
- A template-based tool for quickly constructing and running advanced Boolean searches on Google and Twitter/X for person-based OSINT inves…☆15Updated 6 months ago
- Complete Malware Index - Use at your own Risk!☆14Updated 9 months ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆17Updated 3 years ago
- Learn the most common Threats in mobile technology, Learn how to build your own IMSI catcher, and more!☆20Updated 3 weeks ago