sgxgsx / bluetoothexploitsLinks
Directory with Bluetooth exploits that is used in BlueToolkit
☆15Updated 2 months ago
Alternatives and similar repositories for bluetoothexploits
Users that are interested in bluetoothexploits are comparing it to the libraries listed below
Sorting:
- Bluekit is an extensible engine, CLI tool used in BlueToolkit☆12Updated 2 months ago
- BunnyLogger is a BashBunny payload that uses PowerShell to log keystroke☆17Updated 3 years ago
- Rubber Ducky powered by NeoKey☆26Updated last year
- Tools for attacking various MIFARE RFID cards☆15Updated 6 years ago
- All Type Of Tools written in multipule language .☆20Updated 2 years ago
- mapAccountHijack is a tool designed to carry out a MAP Account hijack attack, which exploits the Message Access Profile (MAP) in Bluetoot…☆53Updated 6 months ago
- ☆14Updated 5 months ago
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions☆17Updated 3 years ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆17Updated 3 years ago
- Lucifer is a RAT (Remote Administrator Trojan) Generator for Windows/Linux systems written in Python.☆21Updated 3 years ago
- Evil maid attacks are the biggest threat to full disk encryption, if you can't provide 100% physical security. It's not about locking you…☆11Updated 8 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆39Updated 2 years ago
- Tool to use Nmap, in Flask with different types of scans. 👁☆10Updated 9 months ago
- Legba recipes.☆50Updated last year
- [Under Development] This is a modification to the Ubertooth One firmware developed by Great Scott Gadgets. The modified firmware is able …☆18Updated 3 years ago
- An Open Source Intelligence Framework to investigate and keep track of the investigation of a certain individual☆16Updated last year
- Basics on commands/tools/info on how to do a forensic analysis of a mobile phone☆29Updated 2 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆37Updated 4 years ago
- crawl a website for links and expose all the vulnerable parameters.☆13Updated 2 years ago
- Just a better dirbuster☆13Updated 2 years ago
- The purpose of this tool is to collect all the subdomains using different subdomain finder tools and then filter out those subdomains whi…☆16Updated 2 years ago
- Phishable is a project that logs misconfigured DNS that can be exploited to conduct phishing attacks & spoof domains. Phishable helps org…☆22Updated 2 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆17Updated last year
- Leveraging kali Linux, hostapd and dnsmasq to spawn effective access points for wireless penetration tests.☆14Updated 4 years ago
- Damn Small SQLi Scanner. (DSSS)☆16Updated 7 years ago
- A template-based tool for quickly constructing and running advanced Boolean searches on Google and Twitter/X for person-based OSINT inves…☆16Updated 8 months ago
- Python tool to detect critical information (passwords, usernames, strings connectios, etc) in public repositories. GITHUB Hacking.☆21Updated 3 years ago
- Monitor 802.11 probe requests from a capture file or network sniffing!☆33Updated 6 months ago
- Covert data exfiltration and detection using 802.11 beacon stuffing☆16Updated 6 years ago