[ { "id": 106299703, "name": "CVE-2017-0781", "full_name": "ojasookert\/CVE-2017-0781", "owner": { "login": "ojasookert", "id": 12931198, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12931198?v=4", "html_url": "https:\/\/github.com\/ojasookert" }, "html_url": "https:\/\/github.com\/ojasookert\/CVE-2017-0781", "description": "Blueborne CVE-2017-0781 Android heap overflow vulnerability", "fork": false, "created_at": "2017-10-09T15:13:25Z", "updated_at": "2024-07-17T11:18:55Z", "pushed_at": "2021-07-29T12:00:48Z", "stargazers_count": 135, "watchers_count": 135, "has_discussions": false, "forks_count": 51, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "armis", "blueborne", "bluetooth", "exploit", "poc" ], "visibility": "public", "forks": 51, "watchers": 135, "score": 0, "subscribers_count": 11 }, { "id": 128436971, "name": "android712-blueborne", "full_name": "X3eRo0\/android712-blueborne", "owner": { "login": "X3eRo0", "id": 24680989, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24680989?v=4", "html_url": "https:\/\/github.com\/X3eRo0" }, "html_url": "https:\/\/github.com\/X3eRo0\/android712-blueborne", "description": "Android Blueborne RCE CVE-2017-0781", "fork": false, "created_at": "2018-04-06T18:32:19Z", "updated_at": "2018-12-05T14:30:22Z", "pushed_at": "2018-04-04T12:59:18Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 20, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 20, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 283876725, "name": "BlueborneDetection", "full_name": "mjancek\/BlueborneDetection", "owner": { "login": "mjancek", "id": 32901382, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32901382?v=4", "html_url": "https:\/\/github.com\/mjancek" }, "html_url": "https:\/\/github.com\/mjancek\/BlueborneDetection", "description": "Simple detection tool for Blueborne vulnerability found on Android devices --- CVE-2017-0781. ", "fork": false, "created_at": "2020-07-30T21:06:19Z", "updated_at": "2021-04-30T12:44:56Z", "pushed_at": "2021-04-30T12:44:54Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "blueborne", "bluetooth", "c" ], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 303310240, "name": "Blue-Borne", "full_name": "CrackSoft900\/Blue-Borne", "owner": { "login": "CrackSoft900", "id": 69074572, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69074572?v=4", "html_url": "https:\/\/github.com\/CrackSoft900" }, "html_url": "https:\/\/github.com\/CrackSoft900\/Blue-Borne", "description": "BlueBorne Exploits & Framework This repository contains a PoC code of various exploits for the BlueBorne vulnerabilities. Under 'android' exploits for the Android RCE vulnerability (CVE-2017-0781), and the SDP Information leak vulnerability (CVE-2017-0785) can be found. Under 'linux-bluez' exploits for the Linux-RCE vulnerability (CVE-2017-1000251) can be found (for Amazon Echo, and Samsung Gear S3). Under 'l2cap_infra' a general testing framework to send and receive raw l2cap messages (using scapy) can be found. Under 'nRF24_BDADDR_Sniffer' a tool to capture bluetooth mac addresses (BDADDR) over the air, using a nRF24L01 chip For more details on BlueBorne, you may read the full technical white paper available here: https:\/\/www.armis.com\/blueborne\/ In addition a several detailed blog posts on the exploitation of these vulnerability can be found here: https:\/\/www.armis.com\/blog\/ =============== Dependencies:", "fork": false, "created_at": "2020-10-12T07:21:08Z", "updated_at": "2024-06-29T00:31:00Z", "pushed_at": "2020-11-04T16:49:05Z", "stargazers_count": 7, "watchers_count": 7, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 7, "score": 0, "subscribers_count": 1 }, { "id": 440265596, "name": "sploit-bX", "full_name": "CarlosDelRosario7\/sploit-bX", "owner": { "login": "CarlosDelRosario7", "id": 65183782, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65183782?v=4", "html_url": "https:\/\/github.com\/CarlosDelRosario7" }, "html_url": "https:\/\/github.com\/CarlosDelRosario7\/sploit-bX", "description": "Bash que instala los sploit CVE-2017-0781 y CVE-2017-0785 y lo necesario para su usos.", "fork": false, "created_at": "2021-12-20T18:14:36Z", "updated_at": "2021-12-21T13:05:19Z", "pushed_at": "2021-12-21T13:05:16Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 670160089, "name": "Learn.BlueJam", "full_name": "DamianSuess\/Learn.BlueJam", "owner": { "login": "DamianSuess", "id": 1216684, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1216684?v=4", "html_url": "https:\/\/github.com\/DamianSuess" }, "html_url": "https:\/\/github.com\/DamianSuess\/Learn.BlueJam", "description": "Learn what is BlueJam CVE-2017-0781", "fork": false, "created_at": "2023-07-24T12:28:02Z", "updated_at": "2023-08-22T10:28:29Z", "pushed_at": "2023-07-24T12:28:46Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0, "subscribers_count": 1 } ]