OpenPathSec / tools-ble-linuxLinks
Raw BLE advertisement + sniffing tool (Linux)
☆14Updated last year
Alternatives and similar repositories for tools-ble-linux
Users that are interested in tools-ble-linux are comparing it to the libraries listed below
Sorting:
- Attempts to reverse a given partial hash to a phone number (or email) given the area code. Written for python3.☆21Updated 2 years ago
- Complete SMS packet manipulation☆114Updated 3 years ago
- Linux tool for sniffing smartcard communication between card and reader using season interface.☆44Updated last year
- Directory with Bluetooth exploits that is used in BlueToolkit☆16Updated 2 months ago
- DEFCON 30 Car Hacking Village Presentation☆11Updated 2 years ago
- Mr. Radar is a port security evading, discovery device used to detect network switches connected to lone network ports.☆12Updated 2 years ago
- ☆14Updated last year
- Rubber Ducky powered by NeoKey☆27Updated last year
- BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy [CVE-2020-15802] [CVE-2022-20361]☆19Updated 3 years ago
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆48Updated 3 years ago
- Fuzz Network Traffic☆18Updated 8 months ago
- A Jupyter Notebook Program To Visualize Your WiGLE Wardriving Data☆18Updated 3 years ago
- Our fork of Iceman's fork for Proxmark III☆16Updated 8 months ago
- Docker Implementation for srsRANProject☆40Updated 3 years ago
- This repository contains a set of InternalBlue patches for the BCM4375B1 Bluetooth controller, allowing to sniff and inject Zigbee, Mosar…☆22Updated 4 years ago
- Framework for abuse Apple Find My Network to perform unprivileged device tracking. USENIX Security '25 and DEFCON Demo Labs.☆54Updated 3 weeks ago
- USB device hardware core with modified behaviour capable of injecting transmissions on behalf of other devices☆35Updated 9 months ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆52Updated 2 years ago
- Tools for attacking various MIFARE RFID cards☆15Updated 6 years ago
- Repository for the Framing Frames publication: security context and transmit queue manipulations, client isolation bypasses, and more.☆47Updated 2 years ago
- ☆33Updated 3 years ago
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions☆17Updated 3 years ago
- Dump an encrypted iPhone backup to a folder for analysis of any artifacts, organised by domain and path of the source file.☆17Updated 2 years ago
- Covert data exfiltration and detection using 802.11 beacon stuffing☆17Updated 6 years ago
- Implementation of Max Kellermann's exploit for CVE-2022-0847☆10Updated 3 years ago
- Checks for tpm vulnerabilities☆37Updated 2 years ago
- A wrapper around the Proxmark3 client that will alert the user of specific events☆30Updated 4 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆12Updated 3 years ago
- Bluekit is an extensible engine, CLI tool used in BlueToolkit☆12Updated 2 months ago
- Flipper zero NFC is mystery. KDF is the simple one in complicated☆10Updated 11 months ago