sgxgsx / bluetoothexploits
Directory with Bluetooth exploits that is used in BlueToolkit
☆10Updated last month
Related projects ⓘ
Alternatives and complementary repositories for bluetoothexploits
- ☆13Updated last year
- Nexus of Android banking Trojans☆15Updated last year
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆19Updated last year
- mapAccountHijack is a tool designed to carry out a MAP Account hijack attack, which exploits the Message Access Profile (MAP) in Bluetoot…☆29Updated last month
- Rubber Ducky powered by NeoKey☆20Updated 5 months ago
- An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.☆14Updated 5 months ago
- This tool is useful in case you want to evade the detection based on simple rules when trying to dump the SAM, SYSTEM or SECURITY hives u…☆10Updated 2 years ago
- Modular framework to exploit UPS devices☆61Updated last year
- A Python script to extract the list of users of a GiTea instance, unauthenticated or authenticated.☆13Updated last year
- ☆20Updated last year
- Powerful advanced web platform for C2 managing and automated penetration testing.☆14Updated last year
- Burp suite Certificate modification tool☆17Updated last year
- Our fork of Iceman's fork for Proxmark III☆12Updated 11 months ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7Updated 2 years ago
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions☆11Updated 2 years ago
- LNK-Dropper Builder☆16Updated last month
- NetFuzzer is a comprehensive network security assessment tool for internal and external networks, including Firewalls, Routers, Switches,…☆13Updated 3 months ago
- Windows Reverse TCP Shell for Hacking and Pentesting☆23Updated 2 months ago
- Passworld is a fully customizable wordlist generator☆14Updated last month
- A utility to fetch and display dns names from the SSL/TLS cert data☆12Updated last year
- The Kill-The-Code Python Program provides a robust mechanism for remotely controlling code execution by monitoring a specified URL for a …☆13Updated 3 months ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆16Updated 2 years ago
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆15Updated 3 months ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆31Updated 3 years ago
- Phishable is a project that logs misconfigured DNS that can be exploited to conduct phishing attacks & spoof domains. Phishable helps org…☆21Updated last year
- Remove Offensive and Profane Words from Wordlists☆14Updated last year
- Pyfuscator is a Python tool designed to obfuscate Python scripts by encoding and encrypting them. It allows you to transform your Python …☆16Updated 3 months ago
- Some useful scripts for CobaltStrike☆10Updated 5 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- ☆28Updated last year