Bluestrike: CLI tool to hack Bluetooth devices through speaker jamming, traffic spoofing & device hijacking (In the making)
☆414Jan 3, 2024Updated 2 years ago
Alternatives and similar repositories for Bluestrike
Users that are interested in Bluestrike are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- [EN] Python script to jam bluetooth devices on area☆18Dec 20, 2022Updated 3 years ago
- No, even your Bluetooth connection isn't safe from hackers! Here's how cybercriminals can target your Bluetooth-enabled devices. You pr…☆22Aug 1, 2023Updated 2 years ago
- Script for conducting DOS-attacks on Bluetooth devices for pentest purposes.☆12Jan 27, 2024Updated 2 years ago
- This repository contains scripts in python from discovering bluetooth to taking over the bluetooth connections.☆180Apr 11, 2024Updated 2 years ago
- Bluetooth hack, forked from https://gitlab.com/kalilinux/packages/bluesnarfer/☆250Jan 8, 2024Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- BlueHunter is bluetooth device hacking framework☆25Jan 16, 2024Updated 2 years ago
- An intelligence gathering tool for hacking Bluetooth☆998Apr 23, 2023Updated 3 years ago
- Script for quick and easy DOS-attacks on bluetooth devices for pentest purposes☆677Jan 29, 2024Updated 2 years ago
- CVE-2024-21306 BadBlue implementation (Using DuckyScript)☆11Jul 11, 2024Updated last year
- Bluetooth DOS Attack Script for Educational Purposes. Used in School Project☆172Jan 7, 2022Updated 4 years ago
- Portable WiFi/Bluetooth/RF-433MHz hacking tool☆42Jun 29, 2024Updated last year
- the wifi jammer tool☆14Feb 13, 2025Updated last year
- These are favored by companies who deal with sensitive information to prevent leaks. The 5GHz WiFi jammer is effective up to 40 meters an…☆19May 1, 2021Updated 5 years ago
- Bluetooth jammer using esp32 with webserver☆639Jan 21, 2025Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Bluetooth hacking tools☆486Apr 20, 2023Updated 3 years ago
- BlueToolkit is an extensible Bluetooth Classic vulnerability testing framework that helps uncover new and old vulnerabilities in Bluetoo…☆694Mar 5, 2026Updated 2 months ago
- Bluetooth jamming esp32 with nrf24l01☆903Nov 4, 2024Updated last year
- List of Bluetooth BR/EDR/LE security resources☆602Oct 3, 2025Updated 7 months ago
- Herramienta orientada a pentesting en la zona bluetooth.☆22Jun 26, 2024Updated last year
- BLE jammer using NRF240L+ modules and Maple Mini (STM32)☆250Oct 31, 2020Updated 5 years ago
- PoC to record audio from a Bluetooth device☆1,582Apr 24, 2026Updated 3 weeks ago
- Bluetooth jamming device. long-range version is under testing☆202Nov 1, 2024Updated last year
- Bluetooth speaker killer☆37Jun 1, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Smart Universal Remote using Waveshare ESP32-S3-Touch-LCD-1.28, 1.69 & 2.8☆15Sep 14, 2025Updated 8 months ago
- Whenever the Raspberry Pi Device is turned on, it attempts to attack all the wifi networks within the area using wifite and then 📧 email…☆51Feb 20, 2022Updated 4 years ago
- HackRF / RTLSDR Spectrum Scanning Interface (WIP)☆29Aug 18, 2016Updated 9 years ago
- A power-modulated jammer in GnuRadio☆24Jan 14, 2022Updated 4 years ago
- Bluebugger☆32Jun 19, 2025Updated 11 months ago
- Open-source ESP32-powered tool to scan, jam, spoof, and master BLE, Wi-Fi, and 2.4GHz networks.☆1,665Jun 22, 2025Updated 11 months ago
- The ESP32-BlueJammer (Bluetooth jammer, BLE jammer, WiFi jammer, RC jammer) disrupts 2.4GHz communications. Using an ESP32 and nRF24 modu…☆6,118Mar 29, 2026Updated last month
- DoS Attacks on Bluetooth Devices for pentest purposes☆35Nov 22, 2025Updated 6 months ago
- DrShell is a cutting-edge tool designed for the dynamic management of reverse shell sessions. Whether you are a seasoned security profess…☆17Aug 20, 2025Updated 9 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Flash Force is a parallelism-based multiprocess hash cracking tool written in Python. Achieve GOD SPEED while cracking the hash with full…☆24Jun 19, 2025Updated 11 months ago
- Fallout Vault-Boy themed faces for pwnagotchi plugin☆10Apr 14, 2024Updated 2 years ago
- Explore the realm of Bluetooth Penetration Testing through our comprehensive website. Learn about different techniques, tools, and best p…☆31Aug 28, 2024Updated last year
- Bluetooth ping flood attack☆114May 11, 2026Updated last week
- GoLang For Ethical Hackers☆55Feb 13, 2023Updated 3 years ago
- 🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard…☆1,823Feb 11, 2026Updated 3 months ago
- A Python script to hack parrot drones automatically. It allows to spawn a shell on the drone to control it.☆15Feb 21, 2019Updated 7 years ago