Directory with Bluetooth exploits that is used in BlueToolkit
☆21Sep 30, 2025Updated 5 months ago
Alternatives and similar repositories for bluetoothexploits
Users that are interested in bluetoothexploits are comparing it to the libraries listed below
Sorting:
- Bluekit is an extensible engine, CLI tool used in BlueToolkit☆17Sep 25, 2025Updated 5 months ago
- mapAccountHijack is a tool designed to carry out a MAP Account hijack attack, which exploits the Message Access Profile (MAP) in Bluetoot…☆69Feb 1, 2025Updated last year
- [Under Development] This is a modification to the Ubertooth One firmware developed by Great Scott Gadgets. The modified firmware is able …☆22Feb 22, 2022Updated 4 years ago
- Lost and Found: Stopping Bluetooth Finders from Leaking Private Information☆14Apr 22, 2022Updated 3 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- This is ultrasonic pest repellent device for bugs based on ATTINY85, resistors and PAM4803 amplifier with set of 40kHz ultrasonic transd…☆18Aug 17, 2025Updated 6 months ago
- Tools used to extract Flash memory from locked MPC5566 (Hardwear.io 2025 talk)☆20May 30, 2025Updated 9 months ago
- Seven different DLL injection techniques in one single project.☆12May 19, 2020Updated 5 years ago
- The utility aims to clean up output generated by popular tools by calculating a hash based on specific JSON values to removing junk data.☆16Apr 5, 2024Updated last year
- Remove Offensive and Profane Words from Wordlists☆15Jul 27, 2023Updated 2 years ago
- Misr: The Ultimate Vulnerability Scanner☆16Aug 9, 2024Updated last year
- BlueToolkit is an extensible Bluetooth Classic vulnerability testing framework that helps uncover new and old vulnerabilities in Bluetoo…☆657Aug 29, 2025Updated 6 months ago
- Tools for attacking various MIFARE RFID cards☆16Jun 21, 2019Updated 6 years ago
- ☆18Jun 25, 2024Updated last year
- This repository contains scripts in python from discovering bluetooth to taking over the bluetooth connections.☆173Apr 11, 2024Updated last year
- Allows invisible Payloads to be decoded and encoded.☆28Mar 5, 2024Updated 2 years ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆24Oct 23, 2021Updated 4 years ago
- Putting the C2 in C2loudflare☆18Jun 28, 2024Updated last year
- An experimental dynamic malware unpacker based on Intel Pin and PE-sieve☆63Aug 21, 2024Updated last year
- View in depth data of all Bluetooth devices around your Ubertooth device. Sends the data remotely to a Discord Webhook if desired so you …☆23Aug 3, 2024Updated last year
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- Rasta's mouse AMSI patch but with function that makes it undetectable.☆14Apr 21, 2021Updated 4 years ago
- A BLE-controlled USB Rubber Ducky clone built with ESP32-S3 boards.☆22Jan 17, 2026Updated last month
- An open source implementation of Apple's Wi-Fi Password Sharing protocol in Swift.☆18Feb 13, 2021Updated 5 years ago
- Another Portable Executable files analysing stuff☆21May 28, 2011Updated 14 years ago
- [EN] Python script to jam bluetooth devices on area☆18Dec 20, 2022Updated 3 years ago
- Automated Password Cracking Tool☆17Dec 19, 2020Updated 5 years ago
- hashgen - the blazingly fast hash generator☆40Feb 10, 2026Updated 3 weeks ago
- TL-WR841N Router Hardware Hacking - Reversing and Backdooring☆39Aug 1, 2023Updated 2 years ago
- This repository contains some modified gap.c file options of the Flipper's BLE function, which can be used to simulate ADV Packet Spoofin…☆16Sep 9, 2023Updated 2 years ago
- Repository to gather the .NET malware I will be developing☆18Mar 23, 2025Updated 11 months ago
- BTLEmap's Bluetooth Low Energy framework that powers the app☆23Dec 8, 2021Updated 4 years ago
- Standalone Metasploit-like XOR encoder for shellcode☆51May 12, 2024Updated last year
- Default Password Generator for Time Warner / Spectrum Routers☆19Jul 27, 2017Updated 8 years ago
- ☆19Sep 18, 2023Updated 2 years ago
- WiFi arsenal☆17May 19, 2020Updated 5 years ago
- Modified version of breach-parse that parses through breached databases to output emails, usernames, and passwords to be imported into co…☆23Apr 29, 2022Updated 3 years ago
- My metasploit modules☆24Jan 8, 2016Updated 10 years ago
- Bluetooth Security Assessment Methodology☆149Jan 8, 2026Updated 2 months ago