BtleJuice Bluetooth Smart (LE) Man-in-the-Middle framework
☆829Oct 3, 2018Updated 7 years ago
Alternatives and similar repositories for btlejuice
Users that are interested in btlejuice are comparing it to the libraries listed below
Sorting:
- A Node.js package for BLE (Bluetooth Low Energy) security assessment using Man-in-the-Middle and other attacks☆808Jan 31, 2022Updated 4 years ago
- Crack and decrypt BLE encryption☆948Aug 26, 2021Updated 4 years ago
- BLE-Replay is a Bluetooth Low Energy (BLE) peripheral assessment tool☆146Aug 25, 2016Updated 9 years ago
- Man in the Middle analysis tool for Bluetooth.☆536Feb 24, 2020Updated 6 years ago
- This repository is DEPRECATED, please use bettercap as this tool has been ported to its BLE modules.☆1,092Feb 19, 2019Updated 7 years ago
- A sniffer for Bluetooth 5 and 4.x LE☆1,092Sep 25, 2025Updated 5 months ago
- Bluetooth Low Energy Swiss-army knife☆2,077Aug 4, 2024Updated last year
- Python 2.x/3.x bindings for BtleJuice (BLE MitM framework)☆14Oct 4, 2017Updated 8 years ago
- Software, firmware, and hardware designs for Ubertooth☆2,077Jan 25, 2024Updated 2 years ago
- Proof of Concept of Sweyntooth Bluetooth Low Energy (BLE) vulnerabilities.☆323Nov 23, 2021Updated 4 years ago
- PoC scripts demonstrating the BlueBorne vulnerabilities☆610May 17, 2021Updated 4 years ago
- ☆124Oct 1, 2016Updated 9 years ago
- A WebSocket C2 Tool☆411Nov 24, 2017Updated 8 years ago
- BLESuite_CLI is a command line tool to enable an easier way to test Bluetooth Low Energy (BLE) devices☆34Aug 1, 2016Updated 9 years ago
- Universal Serial aBUSe is a project to demonstrate the risks of hardware bypasses of software security by Rogan Dawes at SensePost.☆500Aug 11, 2017Updated 8 years ago
- Key Negotiation Of Bluetooth (KNOB) attacks on Bluetooth BR/EDR and BLE [CVE-2019-9506]☆187Apr 4, 2022Updated 3 years ago
- ✨ Purpose only! The dangers of Bluetooth Low Energy(BLE)implementations: Unveiling zero day vulnerabilities and security flaws in modern …☆343May 27, 2024Updated last year
- BLESuite is a Python package that provides an easier way to test Bluetooth Low Energy (BLE) device☆190Oct 9, 2020Updated 5 years ago
- IEEE 802.15.4/ZigBee Security Research Toolkit☆832Sep 12, 2023Updated 2 years ago
- A Bluetooth low energy capture the flag☆746Aug 11, 2025Updated 6 months ago
- Bluetooth Low Energy Device spoofing library☆29Nov 20, 2017Updated 8 years ago
- Btlejack firmware for BBC Micro:Bit☆55Jan 27, 2021Updated 5 years ago
- Blueborne CVE-2017-0785 Android information leak vulnerability☆472Sep 23, 2017Updated 8 years ago
- The iOS Security Testing Framework☆1,383Oct 25, 2020Updated 5 years ago
- Script for searching the extracted firmware file system for goodies!☆1,191Aug 29, 2023Updated 2 years ago
- Car Backdoor Maker☆220Oct 1, 2018Updated 7 years ago
- DBC2 (DropboxC2) is a modular post-exploitation tool, composed of an agent running on the victim's machine, a controler, running on any m…☆306Oct 27, 2017Updated 8 years ago
- WiFi HID Injector - An USB Rubberducky / BadUSB On Steroids.☆1,784Jul 27, 2024Updated last year
- Bluetooth Low Energy (BLE) packet sniffer and transmitter for both standard and non standard (raw bit) based on Software Defined Radio (S…☆868Feb 11, 2026Updated 2 weeks ago
- RFSec-ToolKit is a collection of Radio Frequency Communication Protocol Hacktools.无线通信协议相关的工具集,可借助SDR硬件+相关工具对无线通信进行研究。Collect with ♥ by H…☆1,683May 28, 2024Updated last year
- Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.☆1,321Sep 1, 2021Updated 4 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆161Aug 5, 2016Updated 9 years ago
- Umap2 is the second revision of NCC Group's python based USB host security assessment tool.☆272Sep 30, 2021Updated 4 years ago
- P4wnP1 is a highly customizable USB attack platform, based on a low cost Raspberry Pi Zero or Raspberry Pi Zero W.☆4,353Aug 12, 2024Updated last year
- Tater is a PowerShell implementation of the Hot Potato Windows Privilege Escalation exploit from @breenmachine and @foxglovesec☆453Apr 22, 2016Updated 9 years ago
- Bluetooth experimentation framework for Broadcom and Cypress chips.☆763Aug 21, 2024Updated last year
- powerful auto-backdooring utility☆750Dec 20, 2017Updated 8 years ago
- 📡 A python program to create a fake AP and sniff data.☆1,691Nov 3, 2019Updated 6 years ago
- Python script to inject existing Android applications with a Meterpreter payload.☆644Jul 21, 2023Updated 2 years ago