TarlogicSecurity / BSAM
Bluetooth Security Assessment Methodology
☆125Updated 10 months ago
Alternatives and similar repositories for BSAM:
Users that are interested in BSAM are comparing it to the libraries listed below
- Moxie scans & tests MQTT services. Secure your IoT infrastructure!☆44Updated 9 months ago
- ☆123Updated last year
- This is a simple bash script to fix errors with apt update, upgrade MetaSploit and run some upgrades to improve the system usability with…☆99Updated 7 months ago
- Apple BLE proximity pairing message spoofing☆19Updated last year
- The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility t…☆98Updated 6 months ago
- Deluder is a tool for intercepting traffic of proxy unaware applications. Currently, Deluder supports OpenSSL, GnuTLS, SChannel, WinSock …☆185Updated 6 months ago
- HardeningMeter is an open-source Python tool carefully designed to comprehensively assess the security hardening of binaries and systems.☆61Updated 4 months ago
- Damn Vulnerable Drone is an intentionally vulnerable drone hacking simulator based on the popular ArduPilot/MAVLink architecture, providi…☆194Updated last week
- Wireless Hacking Devices Protocol client☆156Updated this week
- ☆144Updated 7 months ago
- 🚀 A swifty RF toolbox baked for your needs, and it's multi-platform! 🌐✨ Available right now in for amd64 Linux & Windows, and with some…☆175Updated 2 months ago
- ☆114Updated last year
- Hack-A-Sat Qualifiers Writeups☆250Updated 2 years ago
- Android BugBazaar: Your mobile appsec playground to Explore, Exploit, Excel☆49Updated 7 months ago
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆89Updated 11 months ago
- A full-featured open-source Wi-Fi fuzzer☆186Updated 3 weeks ago
- Certainly is a offensive security toolkit to capture large amounts of traffic in various network protocols in bitflip and typosquat scena…☆181Updated 7 months ago
- Full Build Guide for making your own RFID Gooseneck Long Range Reader!☆45Updated 7 months ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆119Updated last year
- Single animated HTML file that teaches the workings of the TCP Handshake.☆21Updated 3 weeks ago
- A Slack bot phishing framework for Red Teaming exercises☆166Updated 11 months ago
- FlowMate, a BurpSuite extension that brings taint analysis to web applications, by tracking all parameters send to a target application a…☆156Updated 4 months ago
- Ping-based Information Lookup and Outbound Transfer☆76Updated 11 months ago
- Some HTB, THM, CTF, Penetration Testing, cyber security related resource and writeups☆26Updated last year
- BlueToolkit is an extensible Bluetooth Classic vulnerability testing framework that helps uncover new and old vulnerabilities in Bluetoo…☆412Updated last month
- ☆57Updated 5 years ago
- A collection of tools that I use in CTF's or for assessments☆95Updated 2 months ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆129Updated 8 months ago
- Practical Hardware Pentesting, published by Packt☆71Updated 2 years ago
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆124Updated 11 months ago