Charmve / BLE-Security-Attack-DefenceLinks
✨ Purpose only! The dangers of Bluetooth Low Energy(BLE)implementations: Unveiling zero day vulnerabilities and security flaws in modern Bluetooth LE stacks.
☆335Updated last year
Alternatives and similar repositories for BLE-Security-Attack-Defence
Users that are interested in BLE-Security-Attack-Defence are comparing it to the libraries listed below
Sorting:
- Proof of Concept of Sweyntooth Bluetooth Low Energy (BLE) vulnerabilities.☆312Updated 3 years ago
- A full-featured open-source Wi-Fi fuzzer☆195Updated last week
- List of Bluetooth BR/EDR/LE security resources☆572Updated this week
- Owfuzz: a WiFi protocol fuzzing tool☆237Updated 2 years ago
- Bluetooth Low Energy hardware-less HackMe☆104Updated 4 years ago
- Wi-Fi Framework for creating proof-of-concepts, automated experiments, test suites, fuzzers, and more.☆242Updated 5 months ago
- BlueFuzz is a Bluetooth fuzz tester. The scanner is general purpose, while the pseudo-random data generator is customized for OBDII - Blu…☆64Updated 8 years ago
- Bluetooth Impersonation AttackS (BIAS) [CVE 2020-10135]☆92Updated 4 years ago
- An app to complete man in the middle attack with Tesla Model 3☆66Updated 2 months ago
- L2Fuzz Source Code☆41Updated last year
- An intelligence gathering tool for hacking Bluetooth☆833Updated 2 years ago
- Broadcom and Cypress firmware emulation for fuzzing and further full-stack debugging☆446Updated last year
- EmbedOS - Embedded security testing virtual machine☆156Updated 4 years ago
- ☆33Updated 6 years ago
- A Series of Baseband & LMP Exploits against Bluetooth Classic Controllers☆513Updated last year
- USB testing made easy☆115Updated 2 years ago
- Tool developed to fuzz the GATT layer of the Bluetooth Low Energy protocol based on defined attack scenarios.☆53Updated 11 months ago
- One command to boot the QEMU system☆37Updated 3 years ago
- Set of tools for security testing of Internet of Things devices using specific network IoT protocols☆361Updated last year
- D-Link firmware decryption PoC☆188Updated last year
- Key Negotiation Of Bluetooth (KNOB) attacks on Bluetooth BR/EDR and BLE [CVE-2019-9506]☆185Updated 3 years ago
- Extendable Pentesting Framework☆147Updated this week
- Damn Vulnerable Vehicle Application☆73Updated 2 years ago
- The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers,…☆435Updated this week
- EMBArk - The firmware security scanning environment☆363Updated 3 weeks ago
- PENIOT: Penetration Testing Tool for IoT☆226Updated 3 years ago
- ☆78Updated 8 years ago
- Bluetooth experimentation framework for Broadcom and Cypress chips.☆743Updated last year
- MQTT-PWN intends to be a one-stop-shop for IoT Broker penetration-testing and security assessment operations.☆424Updated last year
- Clone and moddifications from http://www.secuobs.com/news/15022006-bss_0_8.shtml☆23Updated 9 years ago