zenware / bluemahoLinks
BlueMaho is GUI-shell (interface) for suite of tools for testing security of bluetooth devices. It is freeware, opensource, written on python, uses wxPyhon. It can be used for testing BT-devices for known vulnerabilities and major thing to do – testing to find unknown vulns. Also it can form nice statistics.
☆62Updated 9 years ago
Alternatives and similar repositories for bluemaho
Users that are interested in bluemaho are comparing it to the libraries listed below
Sorting:
- Wireless USB Rubber Ducky triggered via BLE (make your Ubertooth quack!)☆116Updated 6 years ago
- Airodump-ng WiFi Scan Visualizer☆60Updated 7 years ago
- Exploit the hack for IOS 11.1.2 and earlier to collect leaked information.☆87Updated 7 years ago
- The Bluetooth penetration testing tool suite☆123Updated 5 years ago
- Simple Karma Attack☆69Updated 4 years ago
- A script to configure a TP-Link MR3040 running OpenWRT into a simple, yet powerful penetration-testing "dropbox".☆71Updated 10 months ago
- giskismet – Wireless recon visualization tool☆54Updated 9 years ago
- bluesnarfing proof-of-concept tool.☆52Updated 9 years ago
- Arduino Rubber Ducky Framework☆107Updated 6 years ago
- Python plugin for Kismet to perform deauthentication to collect WPA2 handshakes☆95Updated 8 years ago
- WIG (WiFi Information Gathering) is a free and open source utility for WiFi device fingerprinting.☆37Updated 2 years ago
- Bluetooth Honeypot☆260Updated 4 years ago
- hostapd-mana - build-files, and installation-files for OpenWRT☆33Updated 3 years ago
- Simple Wi-Fi Keylogger with multiple layout support.☆27Updated 6 years ago
- Packet injection for wifi; simplified.☆37Updated 2 years ago
- Extra captive portals for captiveflask plugins of wifipumpkin3☆50Updated last year
- ☆124Updated 3 years ago
- A collection of Payloads for the WHID Cactus☆55Updated 5 years ago
- Bluetooth scanner for local devices that may be vulnerable to Blueborne exploit☆153Updated 7 years ago
- The router hacking repo.☆33Updated 10 years ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy☆146Updated 8 years ago
- ☆46Updated 5 years ago
- Use hashcat to crack WPA2 PSK (Pre-Shared Key) passwords!☆78Updated 7 years ago
- SS7 tools and scripts☆218Updated 5 years ago
- Converts a USB Rubber ducky script into a Kali Nethunter friendly format for the HID attack☆139Updated 10 years ago
- 📡🍓🍍 Detects wireless network attacks performed by KARMA module (fake AP). Starts deauthentication attack (for fake access points)☆256Updated 6 years ago
- A program that does Deauthentication Attack on every nearby wireless device☆26Updated 6 years ago
- An automated Wireless RogueAP MITM attack framework.☆186Updated 6 years ago
- beside-ng module for the WiFi Pineapple☆15Updated last year
- SS7 MAP (pen-)testing toolkit☆118Updated 5 years ago