RCayre / injectable-firmwareLinks
Custom firmware for nrf52840-dongle, allowing to easily eavesdrop Bluetooth Low Energy communications and perform multiple active attacks based on InjectaBLE strategy.
☆59Updated 2 years ago
Alternatives and similar repositories for injectable-firmware
Users that are interested in injectable-firmware are comparing it to the libraries listed below
Sorting:
- passive keyless entry exploit research☆29Updated 3 years ago
- Blue Hydra☆74Updated 6 months ago
- Tool for discovering and de-anonymizing Classic Bluetooth connections☆52Updated 5 years ago
- quick and dirty canbus h4xing framework☆140Updated 7 months ago
- Flash-BASH is a Raspberry Pi based tool that uses a multiplexer to "glitch" a target device into a privileged open state.☆27Updated 3 years ago
- Resources to get started with EMFI, based on my HWIO USA 2023 talk☆22Updated 10 months ago
- A tool that bypasses PN553 signature protection☆50Updated last year
- LORCON 802.11 Packet Injection Library (Mirror of Kismet repository)☆83Updated 2 years ago
- NFC MiTM made with two PN532 readers and a Raspberry Pi.☆27Updated 6 months ago
- A reference of the different types of access control card readers and which countries they're commonly found in☆18Updated 2 years ago
- MitM proxy for modifying NFC APDUs on the fly, for use with NFCGate☆19Updated 9 years ago
- GPS Spoofing☆35Updated 2 years ago
- Tools for easy deployment of osmocom stack and pentesting gsm networks with LimeSDR Mini☆20Updated 4 years ago
- Bypassing Rolling Code Systems☆42Updated 5 years ago
- The Multi-Protocol Swiss-Army-Knife for Hardware Hackers (UART/JTAG/SPI/I2C)☆77Updated 7 months ago
- Tools for easy deployment of osmocom stack and pentesting gsm networks with LimeSDR Mini☆62Updated 5 years ago
- ☆23Updated 4 years ago
- A sniffer for Bluetooth 5 and 4.x LE☆95Updated 4 months ago
- OpenBTS-UMTS reloaded 2024. Compatibility with latest UHD drivers, several fixes and updated install documentation for Ubuntu 22.04☆56Updated 11 months ago
- BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy [CVE-2020-15802] [CVE-2022-20361]☆19Updated 2 years ago
- ☆163Updated last month
- Mirage is a powerful and modular framework dedicated to the security analysis of wireless communications.☆294Updated last month
- ☆39Updated 3 years ago
- 🚀 A powerful multi-platform RF toolbox that deploys specialized radio tools in seconds on Linux, Windows, and macOS—supporting x86_64, A…☆192Updated 2 weeks ago
- This will be a wiki when it grows up, if it grows up☆92Updated 11 months ago
- Zigator: A security analysis tool for Zigbee and Thread networks☆32Updated last year
- Some Scapy layers and tools to study LoRa PHY and LoRaWAN☆115Updated 3 months ago
- Full Build Guide for making your own RFID Gooseneck Long Range Reader!☆47Updated 9 months ago
- A tool in Python used with the Yardstick One to perform replay and rolling code attacks, specifically on cars.☆15Updated 4 years ago
- cheap and terrible voltage glitcher hardware/software☆42Updated 5 years ago