Explore the realm of Bluetooth Penetration Testing through our comprehensive website. Learn about different techniques, tools, and best practices used to expose vulnerabilities and improve the security of Bluetooth technologies. Stay up-to-date with latest trends and advancements in the field of Bluetooth security testing.
☆28Aug 28, 2024Updated last year
Alternatives and similar repositories for Bluetooth-Penetration-Testing
Users that are interested in Bluetooth-Penetration-Testing are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Script for quick and easy DOS-attacks on bluetooth devices for pentest purposes☆42Aug 21, 2023Updated 2 years ago
- This repository contains scripts in python from discovering bluetooth to taking over the bluetooth connections.☆175Apr 11, 2024Updated 2 years ago
- Directory with Bluetooth exploits that is used in BlueToolkit☆22Sep 30, 2025Updated 6 months ago
- List of Bluetooth BR/EDR/LE security resources☆600Oct 3, 2025Updated 6 months ago
- Simple scripts used to invoke common functionality in Kali Linux and included tools☆11Mar 25, 2020Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- BLESuite_CLI is a command line tool to enable an easier way to test Bluetooth Low Energy (BLE) devices☆34Aug 1, 2016Updated 9 years ago
- Bluetooth spoofing to grab the connection between two paired bluetooth devices.☆13Aug 3, 2020Updated 5 years ago
- ☆17Jul 20, 2018Updated 7 years ago
- BDResource Technology Co.,Ltd, engaged in making auto electrical diagnostic tools, such as X431,GM tech2,TMS374,Star 2000 Diagnostic Syst…☆15Oct 18, 2012Updated 13 years ago
- Create your own desktop applications using web technologies you're familiar with, such as PHP, HTML JavaScript, CSS and SQLite☆10Nov 19, 2023Updated 2 years ago
- ☆13Apr 24, 2023Updated 2 years ago
- Recover keys from collected Hardnested nonces☆41Dec 12, 2024Updated last year
- A water sort puzzle prototype with some new ideas☆11Jan 5, 2023Updated 3 years ago
- Bluebugger☆31Jun 19, 2025Updated 9 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ESP32 Network Toolbox Scripts☆34Sep 29, 2024Updated last year
- This program show you IMSI numbers of cellphones around you.☆12Nov 14, 2020Updated 5 years ago
- Send SMS from your mobile phone. Phone is connected via Bluetooth.☆19Jul 6, 2024Updated last year
- 🔑⌨ Windows keylogger made in python ;D☆19Jan 2, 2020Updated 6 years ago
- This is the UI for building out our Vision App☆14Jan 30, 2024Updated 2 years ago
- A Swift macro for wrapping a Kotlin ViewModel into a SwiftUI ObservableObject with unidirectional/bidirectional Kotlin binding☆16Nov 16, 2025Updated 4 months ago
- The all-in-one hacking toolbox for hardware penetration testing.☆18Jun 4, 2024Updated last year
- Virtual host brute forcer☆22Jan 10, 2014Updated 12 years ago
- Efficient Approximate Page Rank Algorithm (based on “Local graph partitioning using PageRank vectors” by Andersen, Chung, and Lang)☆10Apr 14, 2014Updated 11 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- This project showcases how to exploit vulnerabilities in NFC cards using Arduino and RFID technology. By leveraging the MFRC522 RFID modu…☆16Jul 4, 2023Updated 2 years ago
- GnuCOBOL binaries for windows☆15Jul 23, 2020Updated 5 years ago
- This repository contains the necessary files for my profile's README. This includes multiple GitHub Actions as well as dynamic content.☆12Updated this week
- Enterprise SOC Lab with automated threat detection, SOAR orchestration, and incident response☆31Jan 21, 2026Updated 2 months ago
- ☆15May 6, 2023Updated 2 years ago
- ☆11Jun 30, 2025Updated 9 months ago
- A penetration testing tool for firestore databases☆13Nov 5, 2020Updated 5 years ago
- Hybrid Post Quantum Cryptography☆20Updated this week
- Modo🧯 -- DocGen for Mojo🔥☆13Mar 27, 2026Updated 2 weeks ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A collection of awesome tools, books, resources, software, documents and cool stuff about IoT and HW security.☆34Mar 8, 2026Updated last month
- a nostr book written in persian.☆12May 16, 2025Updated 10 months ago
- ☆17Dec 14, 2022Updated 3 years ago
- A collection of scripts to simplify life on CLI.☆11Nov 26, 2025Updated 4 months ago
- 19 Social Media Phishing Pages #phishing #shellphish #phish☆16Oct 2, 2020Updated 5 years ago
- Create your own recon & vulnerability scanner with Trickest and GitHub☆48Sep 25, 2023Updated 2 years ago
- This repository contains all basic to advance level cryptography protocols code in c++ with socket programming.☆11Feb 8, 2024Updated 2 years ago