Charmve / BLE-Security-Attack-DefenceLinks
✨ Purpose only! The dangers of Bluetooth Low Energy(BLE)implementations: Unveiling zero day vulnerabilities and security flaws in modern Bluetooth LE stacks.
☆323Updated last year
Alternatives and similar repositories for BLE-Security-Attack-Defence
Users that are interested in BLE-Security-Attack-Defence are comparing it to the libraries listed below
Sorting:
- Owfuzz: a WiFi protocol fuzzing tool☆232Updated 2 years ago
- Proof of Concept of Sweyntooth Bluetooth Low Energy (BLE) vulnerabilities.☆300Updated 3 years ago
- List of Bluetooth BR/EDR/LE security resources☆559Updated last year
- Wi-Fi Framework for creating proof-of-concepts, automated experiments, test suites, fuzzers, and more.☆235Updated 2 months ago
- A full-featured open-source Wi-Fi fuzzer☆190Updated last month
- Bluetooth Low Energy hardware-less HackMe☆103Updated 4 years ago
- BlueFuzz is a Bluetooth fuzz tester. The scanner is general purpose, while the pseudo-random data generator is customized for OBDII - Blu…☆62Updated 8 years ago
- L2Fuzz Source Code☆37Updated last year
- Broadcom and Cypress firmware emulation for fuzzing and further full-stack debugging☆444Updated last year
- PENIOT: Penetration Testing Tool for IoT☆222Updated 3 years ago
- CVE-2024-21306 BadBlue implementation (Using DuckyScript)☆9Updated 11 months ago
- Bluetooth Impersonation AttackS (BIAS) [CVE 2020-10135]☆92Updated 4 years ago
- USB testing made easy☆115Updated 2 years ago
- EmbedOS - Embedded security testing virtual machine☆156Updated 4 years ago
- Bluetooth experimentation framework for Broadcom and Cypress chips.☆737Updated 10 months ago
- BLE-Replay is a Bluetooth Low Energy (BLE) peripheral assessment tool☆135Updated 8 years ago
- Set of tools for security testing of Internet of Things devices using specific network IoT protocols☆359Updated last year
- The CAN Injection Toolkit☆180Updated 2 months ago
- EMBArk - The firmware security scanning environment☆344Updated last week
- AttifyOS 4.0☆81Updated last year
- A vehicle network analysis and attack tool.☆113Updated 3 years ago
- D-Link firmware decryption PoC☆182Updated last year
- The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers,…☆421Updated 3 years ago
- Key Negotiation Of Bluetooth (KNOB) attacks on Bluetooth BR/EDR and BLE [CVE-2019-9506]☆182Updated 3 years ago
- IoTGoat is a deliberately insecure firmware based on OpenWrt.☆182Updated 5 years ago
- MODBUS Penetration Testing Framework☆81Updated 9 years ago
- HomePwn - Swiss Army Knife for Pentesting of IoT Devices☆905Updated 2 years ago
- Toolkit for implant attack of IoT devices☆134Updated 6 years ago
- ☆77Updated 8 years ago
- Damn Vulnerable Vehicle Application☆69Updated 2 years ago