Explore the realm of Bluetooth Penetration Testing through our comprehensive website. Learn about different techniques, tools, and best practices used to expose vulnerabilities and improve the security of Bluetooth technologies. Stay up-to-date with latest trends and advancements in the field of Bluetooth security testing.
☆29Aug 28, 2024Updated last year
Alternatives and similar repositories for Bluetooth-Penetration-Testing
Users that are interested in Bluetooth-Penetration-Testing are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Herramienta orientada a pentesting en la zona bluetooth.☆22Jun 26, 2024Updated last year
- Script for quick and easy DOS-attacks on bluetooth devices for pentest purposes☆43Aug 21, 2023Updated 2 years ago
- A tool which perform deauthentication attack on unpaired bluetooth devices.☆52Aug 30, 2025Updated 8 months ago
- This repository contains scripts in python from discovering bluetooth to taking over the bluetooth connections.☆177Apr 11, 2024Updated 2 years ago
- BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy [CVE-2020-15802] [CVE-2022-20361]☆21Aug 17, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Boost your network's security with our services in Wireless Penetration Testing. We offer comprehensive vulnerability assessments, identi…☆18Feb 4, 2024Updated 2 years ago
- List of Bluetooth BR/EDR/LE security resources☆602Oct 3, 2025Updated 6 months ago
- Simple scripts used to invoke common functionality in Kali Linux and included tools☆11Mar 25, 2020Updated 6 years ago
- Bluetooth spoofing to grab the connection between two paired bluetooth devices.☆13Aug 3, 2020Updated 5 years ago
- Overview about existing tools that can be useful for AWS auditing purposes.☆15Sep 25, 2017Updated 8 years ago
- ☆16Jul 20, 2018Updated 7 years ago
- ☆13Apr 24, 2023Updated 3 years ago
- ESP32 Network Toolbox Scripts☆34Sep 29, 2024Updated last year
- Legacy version of binary hashcat for Linux (64 bits). Used on airgeddon docker container.☆19Mar 30, 2017Updated 9 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- An up-to-date listing of all the various Bluetooth Specification-related elements (Company IDs, Service UUIDs, Characteristic UUIDs and D…☆19Aug 28, 2024Updated last year
- My personal site. Contains my blog and other useful sections☆14Apr 22, 2026Updated last week
- This program show you IMSI numbers of cellphones around you.☆12Nov 14, 2020Updated 5 years ago
- The Kill-The-Code Python Program provides a robust mechanism for remotely controlling code execution by monitoring a specified URL for a …☆17Aug 7, 2024Updated last year
- 🔑⌨ Windows keylogger made in python ;D☆19Jan 2, 2020Updated 6 years ago
- This is the UI for building out our Vision App☆14Jan 30, 2024Updated 2 years ago
- A Swift macro for wrapping a Kotlin ViewModel into a SwiftUI ObservableObject with unidirectional/bidirectional Kotlin binding☆16Nov 16, 2025Updated 5 months ago
- ☆11Mar 1, 2023Updated 3 years ago
- A websocket to tcp proxy, written in node.js, ment for roBrowser users, but can be used for other purposes.☆15Jun 8, 2017Updated 8 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Efficient Approximate Page Rank Algorithm (based on “Local graph partitioning using PageRank vectors” by Andersen, Chung, and Lang)☆10Apr 14, 2014Updated 12 years ago
- GeoIP Target Redirection and Target Filter Redirector using GeoIP API (JS)☆22Oct 14, 2020Updated 5 years ago
- This project showcases how to exploit vulnerabilities in NFC cards using Arduino and RFID technology. By leveraging the MFRC522 RFID modu…☆16Jul 4, 2023Updated 2 years ago
- Binary Ninja loader for A12 SEP firmware☆29Feb 4, 2021Updated 5 years ago
- Enterprise SOC Lab with automated threat detection, SOAR orchestration, and incident response☆31Jan 21, 2026Updated 3 months ago
- ☆15May 6, 2023Updated 2 years ago
- ☆11Jun 30, 2025Updated 10 months ago
- header-fuzz allows you to fuzz any HTTP header with a wordlist and evaluate success or failure based on the returning HTTP status code.☆16Apr 15, 2020Updated 6 years ago
- Modo🧯 -- DocGen for Mojo🔥☆14Mar 27, 2026Updated last month
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ShoLister is a tool that collects all available subdomains for specific hostname or organization from Shodan. The tool is designed to be …☆13May 10, 2022Updated 3 years ago
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Jun 16, 2019Updated 6 years ago
- ☆17Dec 14, 2022Updated 3 years ago
- This firmware is an alternative to the EvilCrowRF default firmware.☆15Jun 6, 2023Updated 2 years ago
- 19 Social Media Phishing Pages #phishing #shellphish #phish☆17Oct 2, 2020Updated 5 years ago
- This is my GitHub profile☆11Updated this week
- https://steemit.com/shadowbrokers/@theshadowbrokers/lost-in-translation # Exploits - **EARLYSHOVEL** RedHat 7.0 - 7.1 Sendmail 8.11.x e…☆14Jun 2, 2017Updated 8 years ago