Charmve / BLE-Security-Attack-DefenceLinks
✨ Purpose only! The dangers of Bluetooth Low Energy(BLE)implementations: Unveiling zero day vulnerabilities and security flaws in modern Bluetooth LE stacks.
☆341Updated last year
Alternatives and similar repositories for BLE-Security-Attack-Defence
Users that are interested in BLE-Security-Attack-Defence are comparing it to the libraries listed below
Sorting:
- Proof of Concept of Sweyntooth Bluetooth Low Energy (BLE) vulnerabilities.☆322Updated 4 years ago
- List of Bluetooth BR/EDR/LE security resources☆589Updated 4 months ago
- A full-featured open-source Wi-Fi fuzzer☆197Updated 4 months ago
- Owfuzz: a WiFi protocol fuzzing tool☆248Updated 2 years ago
- Bluetooth Low Energy hardware-less HackMe☆103Updated 5 years ago
- Wi-Fi Framework for creating proof-of-concepts, automated experiments, test suites, fuzzers, and more.☆250Updated 9 months ago
- BlueFuzz is a Bluetooth fuzz tester. The scanner is general purpose, while the pseudo-random data generator is customized for OBDII - Blu…☆64Updated 8 years ago
- An app to complete man in the middle attack with Tesla Model 3☆70Updated 6 months ago
- Tool developed to fuzz the GATT layer of the Bluetooth Low Energy protocol based on defined attack scenarios.☆65Updated last year
- L2Fuzz Source Code☆44Updated 2 years ago
- Bluetooth Impersonation AttackS (BIAS) [CVE 2020-10135]☆92Updated 4 years ago
- USB testing made easy☆120Updated 2 years ago
- EmbedOS - Embedded security testing virtual machine☆160Updated 5 years ago
- Broadcom and Cypress firmware emulation for fuzzing and further full-stack debugging☆456Updated 2 years ago
- A Series of Baseband & LMP Exploits against Bluetooth Classic Controllers☆540Updated last year
- Damn Vulnerable Vehicle Application☆75Updated last month
- Extendable Pentesting Framework☆154Updated this week
- One command to boot the QEMU system☆37Updated 3 years ago
- EMBArk - The firmware security scanning environment☆373Updated 3 weeks ago
- ☆33Updated 6 years ago
- D-Link firmware decryption PoC☆191Updated 2 years ago
- PENIOT: Penetration Testing Tool for IoT☆230Updated 3 years ago
- The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers,…☆442Updated 4 months ago
- Set of tools for security testing of Internet of Things devices using specific network IoT protocols☆359Updated last year
- An intelligence gathering tool for hacking Bluetooth☆975Updated 2 years ago
- ☆279Updated 3 years ago
- ☆26Updated 4 years ago
- Clone and moddifications from http://www.secuobs.com/news/15022006-bss_0_8.shtml☆23Updated 10 years ago
- Bluetooth experimentation framework for Broadcom and Cypress chips.☆764Updated last year
- MQTT-PWN intends to be a one-stop-shop for IoT Broker penetration-testing and security assessment operations.☆431Updated last year