wirebits / BlueStormLinks
A tool which perform deauthentication attack on unpaired bluetooth devices.
☆46Updated 3 months ago
Alternatives and similar repositories for BlueStorm
Users that are interested in BlueStorm are comparing it to the libraries listed below
Sorting:
- Its like WiFi Pineapple but for only 2$, This simple project allows you to host custom tactical "fake" pages via using termux to your cap…☆23Updated last year
- Bluetooth speaker killer☆32Updated last year
- Easy tools for deauthentication attack wifi☆61Updated 3 weeks ago
- A bluetooth control script for all your Bluetooth devices DoS needs.☆98Updated last year
- This script allows you to take control of a PC with a reverseShell attack.☆54Updated 3 years ago
- This repository contains scripts in python from discovering bluetooth to taking over the bluetooth connections.☆162Updated last year
- Incident Response (IR) tool to create a list of USB-Rubber-Ducky instructions.☆51Updated 6 years ago
- This tool named "CallSpoof" is mainly used to prank with friends , All working apis are present in the script , If you do any illegal act…☆51Updated last year
- Bluebugger☆29Updated 5 months ago
- Make your own rubber ducky USB with VBScript and execute any commands you want!☆42Updated 6 months ago
- This is very usefull bluetooth jammer or doser tool in kali or parrot linux...☆165Updated 6 years ago
- (Unstable*) Copy System Info, Browser Passwords, WiFi Keys & Much More To USB, Automatically !!! (Only For Legal Purposes)☆34Updated 7 years ago
- automate wifi hacking with wicker☆63Updated last year
- Digispark 6-Digit PIN Brute Force attack for USB-OTG Android devices☆17Updated last year
- USB Rubber Ducky Script for capture saved wifi passwords☆80Updated 3 years ago
- Deauther Project can be used to: Disconnect Devices from Networks, and Clone Networks☆36Updated 3 years ago
- Pentesting Suite☆49Updated 5 months ago
- Turn ordinary USB drives into Bad USBs☆50Updated 8 years ago
- This Repo contains of Duckhunter Hid scripts used in kali Nethunter.☆28Updated 3 years ago
- An evil twin attack is a spoofing cyberattack that works by tricking users into connecting to a fake Wi-Fi access point that mimics a leg…☆75Updated 3 years ago
- This script makes your BadUSB steal all the victim's Google Chrome password.☆29Updated 9 months ago
- Scripts made for the ATTiny85 aka DigiSpark to bruteforce Android PINs☆18Updated last year
- This script allows you to create a hidden admin account on your victim's PC.☆42Updated 9 months ago
- This bash script will install wifite2 and its other tools Pyrit, bully, wireshark, hcxtools, hcxdumptool, macchanger☆88Updated 2 months ago
- ALL IN ONE Hacking Tool For Hackers☆17Updated 2 years ago
- Sends random sms text messages to a phone number via email. You can chose the amount of texts and time between the text messages.☆34Updated 2 years ago
- Whenever the Raspberry Pi Device is turned on, it attempts to attack all the wifi networks within the area using wifite and then 📧 email…☆44Updated 3 years ago
- Script to create custom Evil Portals using the Wifi Pineapple 🍍😈☆13Updated 2 years ago
- Fake Wifi AP using ESP32 and ESPAsyncWebServer for hosting static web payloads.☆15Updated 2 years ago
- This script allows you to inject an invisible keylogger thanks to a Bad USB.☆133Updated 2 years ago