sgxgsx / bluetoothexploits
Directory with Bluetooth exploits that is used in BlueToolkit
☆11Updated last month
Alternatives and similar repositories for bluetoothexploits:
Users that are interested in bluetoothexploits are comparing it to the libraries listed below
- Bluekit is an extensible engine, CLI tool used in BlueToolkit☆10Updated last month
- Rubber Ducky powered by NeoKey☆22Updated 9 months ago
- An Open Source Intelligence Framework to investigate and keep track of the investigation of a certain individual☆15Updated last year
- mapAccountHijack is a tool designed to carry out a MAP Account hijack attack, which exploits the Message Access Profile (MAP) in Bluetoot…☆43Updated last month
- Terminal based fake identity generator.☆26Updated last year
- Our fork of Iceman's fork for Proxmark III☆16Updated 3 months ago
- ☆13Updated last week
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆17Updated 2 years ago
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆16Updated 8 months ago
- BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy [CVE-2020-15802] [CVE-2022-20361]☆19Updated 2 years ago
- Automated Pentest Recon Scanner☆14Updated 7 years ago
- Powerful advanced web platform for C2 managing and automated penetration testing.☆14Updated last year
- ☆9Updated 4 months ago
- An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.☆14Updated 10 months ago
- Encodes a message using emojis based on a specified pattern.☆15Updated last year
- OpenAI Security Console - Python3 AI-powered Cybersecurity Framework☆16Updated 2 years ago
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13Updated 10 months ago
- GUI Tool to Generate Android Payloads.☆10Updated 4 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆35Updated last year
- Legba recipes.☆48Updated 7 months ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated 11 months ago
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆18Updated 2 years ago
- Pentesting Suite☆26Updated 9 months ago
- Ded Security Framework is a tool aimed at security professionals☆34Updated 10 months ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆16Updated 3 years ago
- ☆27Updated last year
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆35Updated 4 years ago
- This is a simple Python script that connects to a MISP instance and retrieves attributes of specific types (such as IP addresses, URLs, a…☆16Updated 2 years ago
- Table of common WiFi router SSIDs with their corresponding router model, WPA key examples, keyspace, format and default web interface cre…☆11Updated 3 years ago