Matheus-Garbelini / sweyntooth_bluetooth_low_energy_attacksLinks
Proof of Concept of Sweyntooth Bluetooth Low Energy (BLE) vulnerabilities.
☆318Updated 4 years ago
Alternatives and similar repositories for sweyntooth_bluetooth_low_energy_attacks
Users that are interested in sweyntooth_bluetooth_low_energy_attacks are comparing it to the libraries listed below
Sorting:
- ✨ Purpose only! The dangers of Bluetooth Low Energy(BLE)implementations: Unveiling zero day vulnerabilities and security flaws in modern …☆338Updated last year
- Bluetooth experimentation framework for Broadcom and Cypress chips.☆756Updated last year
- A sniffer for Bluetooth 5 and 4.x LE☆1,077Updated 3 months ago
- BLE-Replay is a Bluetooth Low Energy (BLE) peripheral assessment tool☆145Updated 9 years ago
- Bluetooth Impersonation AttackS (BIAS) [CVE 2020-10135]☆90Updated 4 years ago
- A Series of Baseband & LMP Exploits against Bluetooth Classic Controllers☆528Updated last year
- A Bluetooth low energy capture the flag☆736Updated 5 months ago
- Broadcom and Cypress firmware emulation for fuzzing and further full-stack debugging☆456Updated last year
- Bluetooth Low Energy hardware-less HackMe☆103Updated 5 years ago
- Crack and decrypt BLE encryption☆946Updated 4 years ago
- Active Bluetooth BR/EDR Sniffer/Injector as cheap as any ESP32 board can get. Works with Scapy ;-)☆576Updated 2 years ago
- Key Negotiation Of Bluetooth (KNOB) attacks on Bluetooth BR/EDR and BLE [CVE-2019-9506]☆185Updated 3 years ago
- Clone and moddifications from http://www.secuobs.com/news/15022006-bss_0_8.shtml☆23Updated 10 years ago
- A Node.js package for BLE (Bluetooth Low Energy) security assessment using Man-in-the-Middle and other attacks☆802Updated 3 years ago
- Mirage is a powerful and modular framework dedicated to the security analysis of wireless communications.☆308Updated 9 months ago
- List of Bluetooth BR/EDR/LE security resources☆584Updated 3 months ago
- BtleJuice Bluetooth Smart (LE) Man-in-the-Middle framework☆825Updated 7 years ago
- Umap2 is the second revision of NCC Group's python based USB host security assessment tool.☆272Updated 4 years ago
- An app to complete man in the middle attack with Tesla Model 3☆70Updated 5 months ago
- L2Fuzz Source Code☆42Updated 2 years ago
- Set of tools for security testing of Internet of Things devices using specific network IoT protocols☆360Updated last year
- BlueFuzz is a Bluetooth fuzz tester. The scanner is general purpose, while the pseudo-random data generator is customized for OBDII - Blu…☆64Updated 8 years ago
- ☆233Updated 2 years ago
- A full-featured open-source Wi-Fi fuzzer☆196Updated 3 months ago
- IEEE 802.15.4/ZigBee Security Research Toolkit☆824Updated 2 years ago
- Tool developed to fuzz the GATT layer of the Bluetooth Low Energy protocol based on defined attack scenarios.☆63Updated last year
- Owfuzz: a WiFi protocol fuzzing tool☆242Updated 2 years ago
- Penetration testing framework for ZigBee security research.☆119Updated 8 years ago
- IoTGoat is a deliberately insecure firmware based on OpenWrt.☆183Updated 5 years ago
- This project intends to provide a series of tools to craft, parse, send, analyze and crack a set of LoRaWAN packets in order to audit or …☆180Updated 2 years ago