sgxgsx / bluetoothexploitsLinks
Directory with Bluetooth exploits that is used in BlueToolkit
☆17Updated 3 weeks ago
Alternatives and similar repositories for bluetoothexploits
Users that are interested in bluetoothexploits are comparing it to the libraries listed below
Sorting:
- Bluekit is an extensible engine, CLI tool used in BlueToolkit☆13Updated last month
- Rubber Ducky powered by NeoKey☆26Updated last year
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions☆17Updated 3 years ago
- Discover Non-Discoverable Bluetooth Classic devices☆13Updated last year
- Tools for attacking various MIFARE RFID cards☆15Updated 6 years ago
- Covert data exfiltration and detection using 802.11 beacon stuffing☆17Updated 6 years ago
- Tool to use Nmap, in Flask with different types of scans. 👁☆14Updated last month
- Gain A Meterpreter Shell With A BadUSB Attack In Less Than 5 Seconds.☆17Updated 3 years ago
- mapAccountHijack is a tool designed to carry out a MAP Account hijack attack, which exploits the Message Access Profile (MAP) in Bluetoot…☆57Updated 8 months ago
- ☆13Updated 7 months ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Updated 3 years ago
- Legba recipes.☆51Updated last year
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆35Updated 4 years ago
- Evil maid attacks are the biggest threat to full disk encryption, if you can't provide 100% physical security. It's not about locking you…☆11Updated 9 years ago
- BunnyLogger is a BashBunny payload that uses PowerShell to log keystroke☆17Updated 3 years ago
- Repository of tools used in my blog☆51Updated last year
- Our fork of Iceman's fork for Proxmark III☆17Updated 10 months ago
- Mobile phone PWN tools and scripts☆15Updated 5 years ago
- Basics on commands/tools/info on how to do binary exploitation on a mobile phone☆56Updated 2 years ago
- Remove Offensive and Profane Words from Wordlists☆15Updated 2 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆13Updated 4 years ago
- Network sniffing automation with Bettercap as rogue AP or as client in your network☆24Updated 3 years ago
- Monitor 802.11 probe requests from a capture file or network sniffing!☆32Updated 8 months ago
- Automate Blind SQL Injection with Python.☆22Updated 3 years ago
- Some useful scripts for CobaltStrike☆11Updated 6 years ago
- Subdomain crawler with wordlist using python☆12Updated 5 years ago
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆17Updated last year
- Just a better dirbuster☆13Updated 2 years ago
- A Jupyter Notebook Program To Visualize Your WiGLE Wardriving Data☆18Updated 4 years ago
- CloudDefense.ai is an automated web application security testing tool that audits your web applications by checking for vulnerabilities l…☆49Updated 9 months ago