TarlogicSecurity / BSAMLinks
Bluetooth Security Assessment Methodology
☆138Updated last year
Alternatives and similar repositories for BSAM
Users that are interested in BSAM are comparing it to the libraries listed below
Sorting:
- Wireless Hacking Devices Protocol client☆257Updated this week
- Full Build Guide for making your own RFID Gooseneck Long Range Reader!☆61Updated 3 months ago
- ☆232Updated last year
- ☆130Updated 2 years ago
- Deluder is a tool for intercepting traffic of proxy unaware applications. Currently, Deluder supports OpenSSL, GnuTLS, SChannel, WinSock …☆206Updated last year
- The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility t…☆113Updated 3 months ago
- Code associated with the talk "Blue2thprinting (blue-[tooth)-printing]: answering the question of 'WTF am I even looking at?!'"☆54Updated last week
- Moxie scans & tests MQTT services. Secure your IoT infrastructure!☆51Updated last year
- 🚀 A powerful multi-platform RF toolbox that deploys specialized radio tools in seconds on Linux, Windows, and macOS—supporting x86_64, A…☆256Updated 2 weeks ago
- Hardware Hacking Cheatsheet infograph☆156Updated last year
- ☆57Updated 6 years ago
- Postman OSINT tool to extract creds, token, username, email & more from Postman Public Workspaces☆164Updated 6 months ago
- PETEP (PEnetration TEsting Proxy) is an open-source Java application for traffic analysis & modification using TCP/UDP proxies. PETEP is …☆220Updated last year
- Wi-Fi Framework for creating proof-of-concepts, automated experiments, test suites, fuzzers, and more.☆246Updated 6 months ago
- OSDP attack tool (and the Elvish word for friend)☆104Updated 2 years ago
- This is a opensource repo about how to detect android malware using Random Forest Classifier and explain it use linearsvc.☆11Updated last year
- ☆22Updated last year
- PwnPad is an affordable, hands-on hardware hacking platform built for practical learning. It features a range of challenges that walk use…☆122Updated 4 months ago
- Interactive terminal based tool to configure a Raspberry Pi into a transparent Wifi based proxy with traffic tunnelling support☆29Updated last year
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆92Updated last year
- ☆195Updated 2 years ago
- QRFuzz, a fuzzing toolkit to test malicious QR Codes in mobile applications☆46Updated last year
- ScrapPY is a Python utility for scraping manuals, documents, and other sensitive PDFs to generate wordlists that can be utilized by offen…☆217Updated 6 months ago
- Script to parse Aircrack-ng captures into a SQLite database and extract useful information like handshakes, MGT identities, interesting r…☆113Updated 3 weeks ago
- Opensource repository for DVID V2☆14Updated 5 months ago
- RattaGATTa: Scalable Bluetooth Low-Energy Survey Using a pool of collectors to scan and connect to BTLE devices, shedding light on the in…☆42Updated 9 months ago
- External Playbooks for Public Access☆40Updated 9 months ago
- OSINT - Data Visualization - Blockchain - Awareness - Scam☆43Updated last year
- HardeningMeter is an open-source Python tool carefully designed to comprehensively assess the security hardening of binaries and systems.☆65Updated 11 months ago
- Pentest/Red Team: Resources, repos and scripts.☆78Updated this week