DigitalSecurity / btlejuice-python-bindingsLinks
Python 2.x/3.x bindings for BtleJuice (BLE MitM framework)
☆14Updated 7 years ago
Alternatives and similar repositories for btlejuice-python-bindings
Users that are interested in btlejuice-python-bindings are comparing it to the libraries listed below
Sorting:
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆25Updated 8 years ago
- A few ZigBee Tools to compliment KillerBee☆53Updated 9 years ago
- ☆16Updated 8 years ago
- A IEEE 802.15.4 Wireless Intrusion Detection System, Using the KillerBee Framework☆41Updated 4 years ago
- BLESuite_CLI is a command line tool to enable an easier way to test Bluetooth Low Energy (BLE) devices☆32Updated 8 years ago
- a 802.11 wireless fuzzer☆92Updated 12 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server without crashing the NTP daemon☆22Updated 8 years ago
- 802.15.4 Fuzzer☆21Updated 6 years ago
- An RF stack for building exfiltration systems.☆16Updated 6 years ago
- HARDSPLOIT GUI : The essential security auditing tool for Internet of Things devices you'll need in your toolbox☆39Updated 5 years ago
- NAT Pinning test suite tool for penetration testers.☆31Updated 11 years ago
- KillerZee: Tools for Attacking and Evaluating Z-Wave Networks☆54Updated 6 years ago
- Bluetooth PIN and LINK-KEY Cracker☆51Updated 11 years ago
- ApiMote IEEE 802.15.4/ZigBee Sniffing Hardware☆84Updated 11 years ago
- Black Hat 2017 - Wi-Fi Direct to Hell☆13Updated 7 years ago
- Writeups for the RHME2 CTF☆13Updated 8 years ago
- The most complete and up-to-date repository for BladeRF and YateBTS compatibility☆26Updated 2 years ago
- Patch for hostapd and wpa_supplicant to attempt to exploit heartbleed on EAP-PEAP/TLS/TTLS connections☆106Updated 11 years ago
- Zigator: A security analysis tool for Zigbee and Thread networks☆32Updated last year
- Carve shellcode within the memory using restrictive character set☆9Updated 7 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆34Updated 3 years ago
- ☆14Updated 4 years ago
- SimBrush - SIM data carver and wrapper☆20Updated 13 years ago
- DFF (Digital Forensics Framework)☆10Updated 4 years ago
- swiss army knife of ISM RF!☆24Updated 7 years ago
- DIT is a DTLS MitM proxy implemented in Python 3. It can intercept, manipulate and suppress datagrams between two DTLS endpoints and supp…☆58Updated 3 years ago
- The GSM parser used for GSMmap and SnoopSnitch (SRLabs)☆34Updated 10 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Updated 10 years ago
- A while back antirez, in a post to Bugtraq, detailed a new Tcp portscan method.☆16Updated 8 years ago
- ☆48Updated 3 weeks ago