OpenPathSec / tools-ble-linux
Raw BLE advertisement + sniffing tool (Linux)
☆12Updated 9 months ago
Related projects ⓘ
Alternatives and complementary repositories for tools-ble-linux
- ST25TB / SRx NFC Emulator / Initiator - kameleon - based on TI TRF7970A with MSP430☆11Updated 3 months ago
- DEFCON 30 Car Hacking Village Presentation☆12Updated 2 years ago
- Our fork of Iceman's fork for Proxmark III☆12Updated 11 months ago
- ☆12Updated 3 months ago
- Directory with Bluetooth exploits that is used in BlueToolkit☆10Updated last month
- Linux tool for sniffing smartcard communication between card and reader using season interface.☆38Updated 3 months ago
- Mr. Radar is a port security evading, discovery device used to detect network switches connected to lone network ports.☆12Updated last year
- A PC/SC IFD handler to attach swICC-based cards through a software PC/SC reader.☆29Updated 3 months ago
- ☆20Updated 3 years ago
- A vizualization tool for data generated by the bal framework☆11Updated 2 years ago
- Tools for attacking various MIFARE RFID cards☆14Updated 5 years ago
- ☆12Updated 3 weeks ago
- Frida script that allows to sniff & dump USB traffic on macOS☆13Updated last month
- 3gsocks - a reverse connection socks5 based network pivot☆9Updated 3 years ago
- Powerful advanced web platform for C2 managing and automated penetration testing.☆14Updated last year
- A framework for parsing binary data.☆16Updated 2 years ago
- A fault injection toolkit based on ESP8266 for glitching electronic circuits. It's low-cost, reliable and can be built anywhere. A must h…☆13Updated 7 months ago
- A Jupyter Notebook Program To Visualize Your WiGLE Wardriving Data☆13Updated 3 years ago
- PoC code and tools for Black Hat USA 2024☆15Updated 3 months ago
- Docker Implementation for srsRANProject☆36Updated 2 years ago
- Some stuff about telecom security☆14Updated 8 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 2 years ago
- Tool for discovering and de-anonymizing Classic Bluetooth connections☆44Updated 4 years ago
- Repository for the Framing Frames publication: security context and transmit queue manipulations, client isolation bypasses, and more.☆44Updated last year
- Exploits of different CVE IDs (CVE-2021-37910, CVE-2021-40288, CVE-2021-41435, CVE-2021-41436, CVE-2021-41437, CVE-2021-41441, CVE-2021-4…☆16Updated 2 years ago
- A standalone python script leveraging ntdll for UEFI variable enumeration. This uses elements from the "chipsec" toolkit for formatting w…☆9Updated last year
- The swiss army knife for cybersecurity enthusiasts. All needed scripts and tools integrated into one portable and customizable CLI.☆41Updated 7 months ago
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆47Updated 2 years ago
- Mickey's Blogs☆27Updated last week
- mapAccountHijack is a tool designed to carry out a MAP Account hijack attack, which exploits the Message Access Profile (MAP) in Bluetoot…☆29Updated 2 months ago