Charmve / BLE-Security-Attack-DefenceLinks
✨ Purpose only! The dangers of Bluetooth Low Energy(BLE)implementations: Unveiling zero day vulnerabilities and security flaws in modern Bluetooth LE stacks.
☆326Updated last year
Alternatives and similar repositories for BLE-Security-Attack-Defence
Users that are interested in BLE-Security-Attack-Defence are comparing it to the libraries listed below
Sorting:
- Proof of Concept of Sweyntooth Bluetooth Low Energy (BLE) vulnerabilities.☆308Updated 3 years ago
- A full-featured open-source Wi-Fi fuzzer☆192Updated last month
- List of Bluetooth BR/EDR/LE security resources☆564Updated last year
- Owfuzz: a WiFi protocol fuzzing tool☆234Updated 2 years ago
- Bluetooth Low Energy hardware-less HackMe☆103Updated 4 years ago
- An app to complete man in the middle attack with Tesla Model 3☆65Updated this week
- Wi-Fi Framework for creating proof-of-concepts, automated experiments, test suites, fuzzers, and more.☆237Updated 3 months ago
- CVE-2024-21306 BadBlue implementation (Using DuckyScript)☆9Updated last year
- EmbedOS - Embedded security testing virtual machine☆156Updated 4 years ago
- Bluetooth Impersonation AttackS (BIAS) [CVE 2020-10135]☆92Updated 4 years ago
- BlueFuzz is a Bluetooth fuzz tester. The scanner is general purpose, while the pseudo-random data generator is customized for OBDII - Blu…☆62Updated 8 years ago
- L2Fuzz Source Code☆39Updated last year
- USB testing made easy☆115Updated 2 years ago
- Broadcom and Cypress firmware emulation for fuzzing and further full-stack debugging☆443Updated last year
- Tool developed to fuzz the GATT layer of the Bluetooth Low Energy protocol based on defined attack scenarios.☆44Updated 9 months ago
- Damn Vulnerable Vehicle Application☆70Updated 2 years ago
- An intelligence gathering tool for hacking Bluetooth☆824Updated 2 years ago
- PENIOT: Penetration Testing Tool for IoT☆224Updated 3 years ago
- A Series of Baseband & LMP Exploits against Bluetooth Classic Controllers☆502Updated 11 months ago
- The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers,…☆424Updated 3 years ago
- One command to boot the QEMU system☆37Updated 2 years ago
- ☆33Updated 6 years ago
- IoTGoat is a deliberately insecure firmware based on OpenWrt.☆182Updated 5 years ago
- Clone and moddifications from http://www.secuobs.com/news/15022006-bss_0_8.shtml☆23Updated 9 years ago
- Set of tools for security testing of Internet of Things devices using specific network IoT protocols☆359Updated last year
- MQTT-PWN intends to be a one-stop-shop for IoT Broker penetration-testing and security assessment operations.☆413Updated 11 months ago
- EMBArk - The firmware security scanning environment☆352Updated last week
- A vehicle network analysis and attack tool.☆114Updated 4 years ago
- Extendable Pentesting Framework☆146Updated this week
- Autosuite:an open source multi-protocol low-cost vehicle bus testing framework☆39Updated last year