TarlogicSecurity / BSAMLinks
Bluetooth Security Assessment Methodology
☆131Updated last year
Alternatives and similar repositories for BSAM
Users that are interested in BSAM are comparing it to the libraries listed below
Sorting:
- PwnPad is an affordable, hands-on hardware hacking platform built for practical learning. It features a range of challenges that walk use…☆81Updated 3 weeks ago
- The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility t…☆102Updated 9 months ago
- Moxie scans & tests MQTT services. Secure your IoT infrastructure!☆46Updated last year
- This is a simple bash script to fix errors with apt update, upgrade MetaSploit and run some upgrades to improve the system usability with…☆100Updated 10 months ago
- Wireless Hacking Devices Protocol client☆195Updated last week
- ☆123Updated last year
- HardeningMeter is an open-source Python tool carefully designed to comprehensively assess the security hardening of binaries and systems.☆63Updated 7 months ago
- ☆199Updated 10 months ago
- Wi-Fi Framework for creating proof-of-concepts, automated experiments, test suites, fuzzers, and more.☆235Updated 2 months ago
- DorkEye is a Python script for ethical dorking. The goal is to identify unintentionally exposed resources, such as sensitive files, login…☆47Updated 3 weeks ago
- A collection of tools that I use in CTF's or for assessments☆100Updated 4 months ago
- Apple BLE proximity pairing message spoofing☆19Updated last year
- Hardware Hacking Cheatsheet infograph☆153Updated last year
- 🚀 A powerful multi-platform RF toolbox that deploys specialized radio tools in seconds on Linux, Windows, and macOS—supporting x86_64, A…☆194Updated last week
- A tool for generating detailed, locally-processed reports from iOS backups, supporting encrypted and unencrypted data.☆59Updated 8 months ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆147Updated last year
- Full Build Guide for making your own RFID Gooseneck Long Range Reader!☆48Updated 10 months ago
- ☆57Updated 5 years ago
- QRFuzz, a fuzzing toolkit to test malicious QR Codes in mobile applications☆46Updated last year
- Pentest/Red Team: Resources, repos and scripts.☆69Updated 2 weeks ago
- Automated script to convert and push Burp Suite certificate in Android, and modify Android's IP table to redirect all traffic to Burp Sui…☆110Updated 2 years ago
- quick and dirty canbus h4xing framework☆140Updated 8 months ago
- A public, open source physical security methodology☆46Updated last year
- BlueToolkit is an extensible Bluetooth Classic vulnerability testing framework that helps uncover new and old vulnerabilities in Bluetoo…☆469Updated this week
- ☆115Updated 2 years ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆150Updated 4 months ago
- Deluder is a tool for intercepting traffic of proxy unaware applications. Currently, Deluder supports OpenSSL, GnuTLS, SChannel, WinSock …☆192Updated 8 months ago
- Script to parse Aircrack-ng captures into a SQLite database and extract useful information like handshakes, MGT identities, interesting r…☆107Updated 6 months ago
- A full-featured open-source Wi-Fi fuzzer☆190Updated last month
- WiFi hacking Lab. Virtualized WiFi pentesting laboratory without the need for physical WiFi cards, using mac80211_hwsim and vwifi proyect…☆56Updated last year