TarlogicSecurity / BSAMLinks
Bluetooth Security Assessment Methodology
☆147Updated last month
Alternatives and similar repositories for BSAM
Users that are interested in BSAM are comparing it to the libraries listed below
Sorting:
- Wireless Hacking Devices Protocol client☆281Updated last week
- Code associated with the talk "Blue2thprinting (blue-[tooth)-printing]: answering the question of 'WTF am I even looking at?!'"☆69Updated last week
- Full Build Guide for making your own RFID Gooseneck Long Range Reader!☆61Updated 6 months ago
- ☆243Updated last year
- ☆131Updated 2 years ago
- The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility t…☆114Updated 6 months ago
- External Playbooks for Public Access☆41Updated last year
- Moxie scans & tests MQTT services. Secure your IoT infrastructure!☆53Updated last year
- PETEP (PEnetration TEsting Proxy) is an open-source Java application for traffic analysis & modification using TCP/UDP proxies. PETEP is …☆224Updated 2 years ago
- Hardware Hacking Cheatsheet infograph☆157Updated last year
- MQTT exploit and Pentesting guide for penetration tester☆23Updated 2 years ago
- Deluder is a tool for intercepting traffic of proxy unaware applications. Currently, Deluder supports OpenSSL, GnuTLS, SChannel, WinSock …☆209Updated 2 months ago
- ☆59Updated 6 years ago
- PwnPad is an affordable, hands-on hardware hacking platform built for practical learning. It features a range of challenges that walk use…☆162Updated 2 months ago
- ☆22Updated last year
- Next Generation DorX. Built by Dorks, for Dorks. 🤓☆110Updated 2 years ago
- Apple BLE proximity pairing message spoofing☆19Updated 2 years ago
- OSDP attack tool (and the Elvish word for friend)☆109Updated 2 years ago
- Wi-Fi Framework for creating proof-of-concepts, automated experiments, test suites, fuzzers, and more.☆250Updated 9 months ago
- ☆116Updated 2 years ago
- QRFuzz, a fuzzing toolkit to test malicious QR Codes in mobile applications☆46Updated last year
- ☆198Updated 3 years ago
- Postman OSINT tool to extract creds, token, username, email & more from Postman Public Workspaces☆163Updated 9 months ago
- Script to parse Aircrack-ng captures into a SQLite database and extract useful information like handshakes, MGT identities, interesting r…☆121Updated 3 months ago
- 🚀 A powerful multi-platform RF toolbox that deploys specialized radio tools in seconds on Linux, Windows, and macOS—supporting x86_64, A…☆274Updated last week
- Pentest/Red Team: Resources, repos and scripts.☆79Updated 2 months ago
- REplay is a reverse engineering playground that has 3 separate levels and acts as a fancy little playground mimicking real world reverse …☆16Updated last year
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146Updated last year
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆93Updated 2 years ago
- Automated script to convert and push Burp Suite certificate in Android, and modify Android's IP table to redirect all traffic to Burp Sui…☆111Updated 2 years ago