Explore the realm of Bluetooth Penetration Testing through our comprehensive website. Learn about different techniques, tools, and best practices used to expose vulnerabilities and improve the security of Bluetooth technologies. Stay up-to-date with latest trends and advancements in the field of Bluetooth security testing.
☆26Aug 28, 2024Updated last year
Alternatives and similar repositories for Bluetooth-Penetration-Testing
Users that are interested in Bluetooth-Penetration-Testing are comparing it to the libraries listed below
Sorting:
- Herramienta orientada a pentesting en la zona bluetooth.☆22Jun 26, 2024Updated last year
- A tool which perform deauthentication attack on unpaired bluetooth devices.☆51Aug 30, 2025Updated 6 months ago
- This repository contains scripts in python from discovering bluetooth to taking over the bluetooth connections.☆173Apr 11, 2024Updated last year
- BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy [CVE-2020-15802] [CVE-2022-20361]☆19Aug 17, 2022Updated 3 years ago
- List of Bluetooth BR/EDR/LE security resources☆597Oct 3, 2025Updated 5 months ago
- CVE-2024-21306 BadBlue implementation (Using DuckyScript)☆10Jul 11, 2024Updated last year
- Simple scripts used to invoke common functionality in Kali Linux and included tools☆11Mar 25, 2020Updated 5 years ago
- BLESuite_CLI is a command line tool to enable an easier way to test Bluetooth Low Energy (BLE) devices☆34Aug 1, 2016Updated 9 years ago
- Bluetooth spoofing to grab the connection between two paired bluetooth devices.☆13Aug 3, 2020Updated 5 years ago
- 📦 Shango Deploy | Modern deployment automation tool that simplifies deploying web applications with zero configuration. Supports multipl…☆12Feb 26, 2025Updated last year
- The JetRails 2FA plugin adds an extra layer of security to your Magento store. User based 2FA enablement ensures that admin users are fo…☆11Oct 12, 2024Updated last year
- ☆17Jul 20, 2018Updated 7 years ago
- Bluetooth Low Energy Device spoofing library☆29Nov 20, 2017Updated 8 years ago
- BDResource Technology Co.,Ltd, engaged in making auto electrical diagnostic tools, such as X431,GM tech2,TMS374,Star 2000 Diagnostic Syst…☆15Oct 18, 2012Updated 13 years ago
- Essential playbooks & runbooks for cybersecurity operations. A dynamic resource for security pros to navigate digital threats, with best …☆15Apr 14, 2025Updated 11 months ago
- 🏣 Amazon Web 🏪 Services through 🕍 hands-on 🏘 projects real 🚂 world use cases 🚋 and guided 🚒 tutorials Perfect 🚜 developers ⛸ Dev …☆32May 11, 2025Updated 10 months ago
- Windows Stack Based Auto Buffer Overflow Exploiter☆21Feb 19, 2021Updated 5 years ago
- This project demonstrates deploying a secure, scalable Generative AI (GenAI) solution on Azure using a Retrieval-Augmented Generation (RA…☆18Feb 27, 2025Updated last year
- AI-Powered Code Reviews for Best Practices & Security Issues Across Languages☆21Aug 8, 2025Updated 7 months ago
- Recover keys from collected Hardnested nonces☆40Dec 12, 2024Updated last year
- A repo to use with vim plugin managers.☆12Jun 30, 2015Updated 10 years ago
- Template for building sites in Astro and deploy them using Fleek☆14Jul 20, 2024Updated last year
- Bluebugger☆31Jun 19, 2025Updated 9 months ago
- You’ve hardened your servers, locked down your website and are ready to take on the internet. But all your hard work was in vain, because…☆15Mar 6, 2017Updated 9 years ago
- ESP32 Network Toolbox Scripts☆34Sep 29, 2024Updated last year
- A collection of best practices, research, and tools for enhancing security in Web3 applications. Covers smart contract vulnerabilities, b…☆15Feb 12, 2025Updated last year
- The Kill-The-Code Python Program provides a robust mechanism for remotely controlling code execution by monitoring a specified URL for a …☆18Aug 7, 2024Updated last year
- 🔑⌨ Windows keylogger made in python ;D☆19Jan 2, 2020Updated 6 years ago
- Enterprise SOC Lab with automated threat detection, SOAR orchestration, and incident response☆30Jan 21, 2026Updated 2 months ago
- A Swift macro for wrapping a Kotlin ViewModel into a SwiftUI ObservableObject with unidirectional/bidirectional Kotlin binding☆16Nov 16, 2025Updated 4 months ago
- The all-in-one hacking toolbox for hardware penetration testing.☆18Jun 4, 2024Updated last year
- A websocket to tcp proxy, written in node.js, ment for roBrowser users, but can be used for other purposes.☆15Jun 8, 2017Updated 8 years ago
- Virtual host brute forcer☆22Jan 10, 2014Updated 12 years ago
- *READY TO USE* Terraform baseline for implementing essential AWS security best practices, including Organizations, SSO, MFA, SCPs, Budget…☆25Nov 2, 2024Updated last year
- ☆15May 6, 2023Updated 2 years ago
- ☆11Jun 30, 2025Updated 8 months ago
- A penetration testing tool for firestore databases☆13Nov 5, 2020Updated 5 years ago
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Jun 16, 2019Updated 6 years ago
- a nostr book written in persian.☆12May 16, 2025Updated 10 months ago