Charmve / BLE-Security-Attack-DefenceLinks
✨ Purpose only! The dangers of Bluetooth Low Energy(BLE)implementations: Unveiling zero day vulnerabilities and security flaws in modern Bluetooth LE stacks.
☆337Updated last year
Alternatives and similar repositories for BLE-Security-Attack-Defence
Users that are interested in BLE-Security-Attack-Defence are comparing it to the libraries listed below
Sorting:
- Proof of Concept of Sweyntooth Bluetooth Low Energy (BLE) vulnerabilities.☆316Updated 4 years ago
- List of Bluetooth BR/EDR/LE security resources☆582Updated 2 months ago
- A full-featured open-source Wi-Fi fuzzer☆193Updated 2 months ago
- Owfuzz: a WiFi protocol fuzzing tool☆242Updated 2 years ago
- Bluetooth Low Energy hardware-less HackMe☆103Updated 5 years ago
- BlueFuzz is a Bluetooth fuzz tester. The scanner is general purpose, while the pseudo-random data generator is customized for OBDII - Blu…☆64Updated 8 years ago
- Wi-Fi Framework for creating proof-of-concepts, automated experiments, test suites, fuzzers, and more.☆246Updated 8 months ago
- EmbedOS - Embedded security testing virtual machine☆158Updated 5 years ago
- Tool developed to fuzz the GATT layer of the Bluetooth Low Energy protocol based on defined attack scenarios.☆61Updated last year
- An app to complete man in the middle attack with Tesla Model 3☆69Updated 4 months ago
- L2Fuzz Source Code☆42Updated 2 years ago
- Damn Vulnerable Vehicle Application☆74Updated 3 years ago
- One command to boot the QEMU system☆37Updated 3 years ago
- Bluetooth Impersonation AttackS (BIAS) [CVE 2020-10135]☆90Updated 4 years ago
- Extendable Pentesting Framework☆154Updated this week
- USB testing made easy☆119Updated 2 years ago
- Broadcom and Cypress firmware emulation for fuzzing and further full-stack debugging☆452Updated last year
- ☆33Updated 6 years ago
- PENIOT: Penetration Testing Tool for IoT☆227Updated 3 years ago
- A Series of Baseband & LMP Exploits against Bluetooth Classic Controllers☆523Updated last year
- BLEDiff is an automated, scalable, property-agnostic, and black-box protocol noncompliance checker for BLE devices.☆13Updated 2 years ago
- A list of lists involving IoT in general☆149Updated 4 years ago
- A vehicle network analysis and attack tool.☆116Updated 4 years ago
- The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers,…☆441Updated 2 months ago
- D-Link firmware decryption PoC☆189Updated 2 years ago
- EMBArk - The firmware security scanning environment☆367Updated 3 weeks ago
- Set of tools for security testing of Internet of Things devices using specific network IoT protocols☆361Updated last year
- Key Negotiation Of Bluetooth (KNOB) attacks on Bluetooth BR/EDR and BLE [CVE-2019-9506]☆185Updated 3 years ago
- AttifyOS 4.0☆90Updated last year
- awesome iot exploit resource☆70Updated last year