sgxgsx / bluetoothexploitsView external linksLinks
Directory with Bluetooth exploits that is used in BlueToolkit
☆21Sep 30, 2025Updated 4 months ago
Alternatives and similar repositories for bluetoothexploits
Users that are interested in bluetoothexploits are comparing it to the libraries listed below
Sorting:
- Bluekit is an extensible engine, CLI tool used in BlueToolkit☆17Sep 25, 2025Updated 4 months ago
- mapAccountHijack is a tool designed to carry out a MAP Account hijack attack, which exploits the Message Access Profile (MAP) in Bluetoot…☆66Feb 1, 2025Updated last year
- [Under Development] This is a modification to the Ubertooth One firmware developed by Great Scott Gadgets. The modified firmware is able …☆22Feb 22, 2022Updated 3 years ago
- Lost and Found: Stopping Bluetooth Finders from Leaking Private Information☆14Apr 22, 2022Updated 3 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- BlueToolkit is an extensible Bluetooth Classic vulnerability testing framework that helps uncover new and old vulnerabilities in Bluetoo…☆651Aug 29, 2025Updated 5 months ago
- This is ultrasonic pest repellent device for bugs based on ATTINY85, resistors and PAM4803 amplifier with set of 40kHz ultrasonic transd…☆17Aug 17, 2025Updated 5 months ago
- A tool which perform deauthentication attack on unpaired bluetooth devices.☆49Aug 30, 2025Updated 5 months ago
- Tools used to extract Flash memory from locked MPC5566 (Hardwear.io 2025 talk)☆20May 30, 2025Updated 8 months ago
- Remove Offensive and Profane Words from Wordlists☆15Jul 27, 2023Updated 2 years ago
- Misr: The Ultimate Vulnerability Scanner☆16Aug 9, 2024Updated last year
- Seven different DLL injection techniques in one single project.☆12May 19, 2020Updated 5 years ago
- ☆18Jun 25, 2024Updated last year
- Tools for attacking various MIFARE RFID cards☆16Jun 21, 2019Updated 6 years ago
- Allows invisible Payloads to be decoded and encoded.☆28Mar 5, 2024Updated last year
- Putting the C2 in C2loudflare☆18Jun 28, 2024Updated last year
- A BLE-controlled USB Rubber Ducky clone built with ESP32-S3 boards.☆21Jan 17, 2026Updated 3 weeks ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆24Oct 23, 2021Updated 4 years ago
- An experimental dynamic malware unpacker based on Intel Pin and PE-sieve☆63Aug 21, 2024Updated last year
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- Rasta's mouse AMSI patch but with function that makes it undetectable.☆14Apr 21, 2021Updated 4 years ago
- View in depth data of all Bluetooth devices around your Ubertooth device. Sends the data remotely to a Discord Webhook if desired so you …☆21Aug 3, 2024Updated last year
- [EN] Python script to jam bluetooth devices on area☆18Dec 20, 2022Updated 3 years ago
- An open source implementation of Apple's Wi-Fi Password Sharing protocol in Swift.☆18Feb 13, 2021Updated 5 years ago
- Automated Password Cracking Tool☆17Dec 19, 2020Updated 5 years ago
- Another Portable Executable files analysing stuff☆21May 28, 2011Updated 14 years ago
- TL-WR841N Router Hardware Hacking - Reversing and Backdooring☆39Aug 1, 2023Updated 2 years ago
- hashgen - the blazingly fast hash generator☆40Updated this week
- This repository contains some modified gap.c file options of the Flipper's BLE function, which can be used to simulate ADV Packet Spoofin…☆15Sep 9, 2023Updated 2 years ago
- BTLEmap's Bluetooth Low Energy framework that powers the app☆23Dec 8, 2021Updated 4 years ago
- Repository to gather the .NET malware I will be developing☆18Mar 23, 2025Updated 10 months ago
- Standalone Metasploit-like XOR encoder for shellcode☆50May 12, 2024Updated last year
- My metasploit modules☆24Jan 8, 2016Updated 10 years ago
- ☆19Sep 18, 2023Updated 2 years ago
- WiFi arsenal☆17May 19, 2020Updated 5 years ago
- Hardened your Windows OS against forensics analysis☆22Nov 27, 2024Updated last year
- Default Password Generator for Time Warner / Spectrum Routers☆19Jul 27, 2017Updated 8 years ago
- Modified version of breach-parse that parses through breached databases to output emails, usernames, and passwords to be imported into co…☆23Apr 29, 2022Updated 3 years ago
- Bluetooth Security Assessment Methodology☆149Jan 8, 2026Updated last month