sgxgsx / bluetoothexploitsLinks
Directory with Bluetooth exploits that is used in BlueToolkit
☆18Updated 3 months ago
Alternatives and similar repositories for bluetoothexploits
Users that are interested in bluetoothexploits are comparing it to the libraries listed below
Sorting:
- Bluekit is an extensible engine, CLI tool used in BlueToolkit☆15Updated 3 months ago
- Rubber Ducky powered by NeoKey☆28Updated last year
- BunnyLogger is a BashBunny payload that uses PowerShell to log keystroke☆16Updated 3 years ago
- [Under Development] This is a modification to the Ubertooth One firmware developed by Great Scott Gadgets. The modified firmware is able …☆22Updated 3 years ago
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions☆17Updated 3 years ago
- Basics on commands/tools/info on how to do a forensic analysis of a mobile phone☆30Updated 2 years ago
- mapAccountHijack is a tool designed to carry out a MAP Account hijack attack, which exploits the Message Access Profile (MAP) in Bluetoot…☆64Updated 11 months ago
- Python tool to detect critical information (passwords, usernames, strings connectios, etc) in public repositories. GITHUB Hacking.☆22Updated 4 years ago
- A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrator…☆15Updated 6 years ago
- Packet injection for wifi; simplified.☆38Updated 3 years ago
- Generate HID attack strings for Kali Nethunter☆12Updated 10 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Updated 3 years ago
- Tools for attacking various MIFARE RFID cards☆15Updated 6 years ago
- Basics on commands/tools/info on how to do binary exploitation on a mobile phone☆56Updated 2 years ago
- Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more☆56Updated last year
- Gain A Meterpreter Shell With A BadUSB Attack In Less Than 5 Seconds.☆18Updated 3 years ago
- All Type Of Tools written in multipule language .☆22Updated 3 years ago
- Covert data exfiltration and detection using 802.11 beacon stuffing☆16Updated 6 years ago
- A Jupyter Notebook Program To Visualize Your WiGLE Wardriving Data☆18Updated 4 years ago
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆15Updated 2 years ago
- A Simple Script For SSH BruteForce☆38Updated 2 years ago
- simple script to pwn android phone with physical access☆27Updated 7 years ago
- BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy [CVE-2020-15802] [CVE-2022-20361]☆19Updated 3 years ago
- Social Engineering Attack Using Phishing in a Local Area Wi-Fi by Creating an Access Point and DNS Manipulation☆13Updated 4 years ago
- Android devices using ADB via the Shodan API. It prompts the user for a command payload, then establishes TCP connections to devices with…☆13Updated this week
- This tool will help in generating reverse shells easily for all types of OS.☆19Updated 2 years ago
- Automated Pentest Recon Scanner☆14Updated 8 years ago
- Monitor 802.11 probe requests from a capture file or network sniffing!☆34Updated last month
- Python3 script to dump breach data from Dehashed☆38Updated 6 months ago
- Repository of tools used in my blog☆51Updated last year