Script for quick and easy DOS-attacks on bluetooth devices for pentest purposes
☆42Aug 21, 2023Updated 2 years ago
Alternatives and similar repositories for BLUETOOTH-DOS-ATTACK-SCRIPT
Users that are interested in BLUETOOTH-DOS-ATTACK-SCRIPT are comparing it to the libraries listed below
Sorting:
- This repository contains scripts in python from discovering bluetooth to taking over the bluetooth connections.☆173Apr 11, 2024Updated last year
- A tool which perform deauthentication attack on unpaired bluetooth devices.☆50Aug 30, 2025Updated 6 months ago
- Tsunami-Fi is simple multi-tool bash application for Wi-Fi attacks☆66Jun 18, 2022Updated 3 years ago
- HAXOR-X is a Kali Linux hacking tools installer for Termux and linux system. HAXOR-X was developed for Termux and linux based systems. Us…☆27Dec 26, 2022Updated 3 years ago
- Instagram information gathering☆13Feb 6, 2023Updated 3 years ago
- Advanced payload generetor and multi handler☆37Dec 20, 2020Updated 5 years ago
- NITRO, PAYSAFECARD, STEAM CODES GENERATOR☆14Jun 17, 2022Updated 3 years ago
- Bluebugger☆30Jun 19, 2025Updated 8 months ago
- 🔥 simplifying streak recovery.☆28Oct 20, 2022Updated 3 years ago
- List of Bluetooth BR/EDR/LE security resources☆592Oct 3, 2025Updated 5 months ago
- In this repositiories you will get some intresting this but this should be use for fun or kidding. This method should not be performed at…☆15Apr 27, 2023Updated 2 years ago
- LulzSec FB Cracker ToolKit Bruter V0.1 tool written in perl to perform a dictionary-based attack on a specific Facebook user through HTTP…☆11Aug 14, 2017Updated 8 years ago
- This is a simple MD5 Hash Cracker tool to decrypt it. The usage is :☆11Dec 29, 2018Updated 7 years ago
- This will help you to connect to your phone ( or any phone in general ) remotely using scrcpy☆14Aug 28, 2020Updated 5 years ago
- gathering or searching websites that are vulnerable to sql injection ( GUI Tools )☆33Dec 18, 2019Updated 6 years ago
- 🚀 Transmission portable for Windows☆14Jan 4, 2026Updated 2 months ago
- A Command Line Tool to create shareable development workspaces instantly on different Linux distributions irrespective of host operating …☆11Dec 22, 2019Updated 6 years ago
- Same @Mebus/cupp tool but best speed and Creates every possible word using the information you provide.☆20Nov 30, 2025Updated 3 months ago
- Enterprise SOC Lab with automated threat detection, SOAR orchestration, and incident response☆28Jan 21, 2026Updated last month
- Threat intelligence or Cyber Threat Intelligence is the process of identifying and analyzing gathered information about past, current, an…☆13Feb 18, 2024Updated 2 years ago
- Find all valid unlock pin pattern for android phone for a 3 by 3 grid☆10Aug 16, 2019Updated 6 years ago
- Automatically exported from code.google.com/p/auto-reaver☆13Mar 22, 2015Updated 10 years ago
- RATs library 2003 to present☆16Oct 14, 2023Updated 2 years ago
- Simple scripts used to invoke common functionality in Kali Linux and included tools☆11Mar 25, 2020Updated 5 years ago
- CUPP - Common User Passwords Profiler !☆15Jun 14, 2024Updated last year
- It is a simple shell script that brute force Android Lock screen (When USB DEBUGGING is enable) its uses ADB tools FOR BruteForce TO use …☆12Jan 11, 2024Updated 2 years ago
- ☆11Aug 18, 2021Updated 4 years ago
- A script that can be used to flood a phishing website with useless information.☆12Oct 2, 2020Updated 5 years ago
- Find all hostnames related to a given domain. Helpful during VA/PT work.☆16May 1, 2022Updated 3 years ago
- Unlock an Android phone (or device) by bruteforcing the lockscreen PIN. Turn your Kali Nethunter phone into a bruteforce PIN cracker for …☆15Mar 4, 2023Updated 3 years ago
- List of android RATs☆13Jan 2, 2021Updated 5 years ago
- BAIT LINUX Sofware Linux Dirtibution On Android Termux☆16Nov 15, 2021Updated 4 years ago
- Oh My Zsh theme based on Parrot OS bash theme☆14Nov 10, 2023Updated 2 years ago
- ☆17Oct 16, 2019Updated 6 years ago
- Install zsh on termux☆12Dec 30, 2024Updated last year
- Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers. It oc…☆16Jan 21, 2023Updated 3 years ago
- The_Scripter is tools for making pentesting easy. It contains lots of automation scripts like hash cracker, ssh_cracker,etc.☆14Nov 25, 2022Updated 3 years ago
- HashRipper is a powerful and fast multi-threaded ethical hacking tool written in Python for cracking hashes. It supports over 17+ popular…☆22Nov 19, 2025Updated 3 months ago
- Distributed WPA/WPA2 cracker☆16Mar 23, 2015Updated 10 years ago