BtleJuice Bluetooth Smart (LE) Man-in-the-Middle framework
☆835Oct 3, 2018Updated 7 years ago
Alternatives and similar repositories for btlejuice
Users that are interested in btlejuice are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Node.js package for BLE (Bluetooth Low Energy) security assessment using Man-in-the-Middle and other attacks☆819Jan 31, 2022Updated 4 years ago
- Python 2.x/3.x bindings for BtleJuice (BLE MitM framework)☆14Oct 4, 2017Updated 8 years ago
- Man in the Middle analysis tool for Bluetooth.☆536Feb 24, 2020Updated 6 years ago
- BLE-Replay is a Bluetooth Low Energy (BLE) peripheral assessment tool☆147Aug 25, 2016Updated 9 years ago
- Crack and decrypt BLE encryption☆954Aug 26, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Bluetooth Low Energy Swiss-army knife☆2,081Aug 4, 2024Updated last year
- A sniffer for Bluetooth 5 and 4.x LE☆1,106Sep 25, 2025Updated 6 months ago
- This repository is DEPRECATED, please use bettercap as this tool has been ported to its BLE modules.☆1,093Feb 19, 2019Updated 7 years ago
- Software, firmware, and hardware designs for Ubertooth☆2,085Mar 19, 2026Updated 3 weeks ago
- Proof of Concept of Sweyntooth Bluetooth Low Energy (BLE) vulnerabilities.☆326Nov 23, 2021Updated 4 years ago
- A WebSocket C2 Tool☆416Nov 24, 2017Updated 8 years ago
- ☆124Oct 1, 2016Updated 9 years ago
- ✨ Purpose only! The dangers of Bluetooth Low Energy(BLE)implementations: Unveiling zero day vulnerabilities and security flaws in modern …☆346May 27, 2024Updated last year
- PoC scripts demonstrating the BlueBorne vulnerabilities☆610May 17, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Key Negotiation Of Bluetooth (KNOB) attacks on Bluetooth BR/EDR and BLE [CVE-2019-9506]☆187Apr 4, 2022Updated 4 years ago
- BLESuite is a Python package that provides an easier way to test Bluetooth Low Energy (BLE) device☆190Oct 9, 2020Updated 5 years ago
- Btlejack firmware for BBC Micro:Bit☆55Jan 27, 2021Updated 5 years ago
- A Bluetooth low energy capture the flag☆754Mar 26, 2026Updated 2 weeks ago
- DBC2 (DropboxC2) is a modular post-exploitation tool, composed of an agent running on the victim's machine, a controler, running on any m…☆308Oct 27, 2017Updated 8 years ago
- BLESuite_CLI is a command line tool to enable an easier way to test Bluetooth Low Energy (BLE) devices☆34Aug 1, 2016Updated 9 years ago
- Bluetooth Low Energy Device spoofing library☆29Nov 20, 2017Updated 8 years ago
- The iOS Security Testing Framework☆1,383Oct 25, 2020Updated 5 years ago
- Bluetooth Low Energy (BLE) packet sniffer and transmitter for both standard and non standard (raw bit) based on Software Defined Radio (S…☆878Mar 31, 2026Updated last week
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Script for searching the extracted firmware file system for goodies!☆1,198Aug 29, 2023Updated 2 years ago
- IEEE 802.15.4/ZigBee Security Research Toolkit☆839Sep 12, 2023Updated 2 years ago
- Universal Serial aBUSe is a project to demonstrate the risks of hardware bypasses of software security by Rogan Dawes at SensePost.☆500Aug 11, 2017Updated 8 years ago
- Car Backdoor Maker☆220Oct 1, 2018Updated 7 years ago
- DeNiSe is a proof of concept for tunneling TCP over DNS in Python☆38Dec 17, 2021Updated 4 years ago
- Bluetooth experimentation framework for Broadcom and Cypress chips.☆770Aug 21, 2024Updated last year
- Blueborne CVE-2017-0785 Android information leak vulnerability☆468Sep 23, 2017Updated 8 years ago
- An intelligence gathering tool for hacking Bluetooth☆995Apr 23, 2023Updated 2 years ago
- RFSec-ToolKit is a collection of Radio Frequency Communication Protocol Hacktools.无线通信协议相关的工具集,可借助SDR硬件+相关工具对无线通信进行研究。Collect with ♥ by H…☆1,694May 28, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Umap2 is the second revision of NCC Group's python based USB host security assessment tool.☆273Sep 30, 2021Updated 4 years ago
- This is a PowerShell based tool that is designed to act like a RAT. Its interface is that of a shell where any command that is supported …☆845Jun 25, 2024Updated last year
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆161Aug 5, 2016Updated 9 years ago
- Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.☆1,322Sep 1, 2021Updated 4 years ago
- Bluetooth Impersonation AttackS (BIAS) [CVE 2020-10135]☆92Jun 16, 2021Updated 4 years ago
- Clone and moddifications from http://www.secuobs.com/news/15022006-bss_0_8.shtml☆23Nov 5, 2015Updated 10 years ago
- WiFi HID Injector - An USB Rubberducky / BadUSB On Steroids.☆1,793Jul 27, 2024Updated last year