TarlogicSecurity / BSAMLinks
Bluetooth Security Assessment Methodology
☆129Updated last year
Alternatives and similar repositories for BSAM
Users that are interested in BSAM are comparing it to the libraries listed below
Sorting:
- Wireless Hacking Devices Protocol client☆183Updated this week
- Moxie scans & tests MQTT services. Secure your IoT infrastructure!☆46Updated 11 months ago
- ☆197Updated 9 months ago
- 🚀 A powerful multi-platform RF toolbox that deploys specialized radio tools in seconds on Linux, Windows, and macOS—supporting x86_64, A…☆192Updated 2 weeks ago
- The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility t…☆100Updated 8 months ago
- Full Build Guide for making your own RFID Gooseneck Long Range Reader!☆47Updated 9 months ago
- Apple BLE proximity pairing message spoofing☆19Updated last year
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆89Updated last year
- A python3 script searching for secret on swaggerhub☆65Updated 3 years ago
- Certainly is a offensive security toolkit to capture large amounts of traffic in various network protocols in bitflip and typosquat scena…☆185Updated 9 months ago
- This is a simple bash script to fix errors with apt update, upgrade MetaSploit and run some upgrades to improve the system usability with…☆100Updated 9 months ago
- Interactive terminal based tool to configure a Raspberry Pi into a transparent Wifi based proxy with traffic tunnelling support☆28Updated last year
- BlueToolkit is an extensible Bluetooth Classic vulnerability testing framework that helps uncover new and old vulnerabilities in Bluetoo…☆452Updated last week
- Hardware Hacking Cheatsheet infograph☆151Updated last year
- ☆123Updated last year
- Nuclei templates for honeypots detection.☆194Updated last year
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆91Updated last year
- Deluder is a tool for intercepting traffic of proxy unaware applications. Currently, Deluder supports OpenSSL, GnuTLS, SChannel, WinSock …☆190Updated 8 months ago
- Pentest/Red Team: Resources, repos and scripts.☆69Updated 2 weeks ago
- The Multi-Protocol Swiss-Army-Knife for Hardware Hackers (UART/JTAG/SPI/I2C)☆77Updated 7 months ago
- A public, open source physical security methodology☆46Updated last year
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆120Updated last year
- ☆57Updated 5 years ago
- FlowMate, a BurpSuite extension that brings taint analysis to web applications, by tracking all parameters send to a target application a…☆161Updated 6 months ago
- RF-modulated high fidelity laser microphone and keystroke sniffer☆74Updated 7 months ago
- Script to parse Aircrack-ng captures into a SQLite database and extract useful information like handshakes, MGT identities, interesting r…☆104Updated 6 months ago
- OSDP attack tool (and the Elvish word for friend)☆101Updated last year
- Slip is a CLI tool to create malicious archive files containing path traversal payloads. It supports zip, tar, 7z and zip-like (jar, war,…☆102Updated last week
- A collection of tools that I use in CTF's or for assessments☆98Updated 4 months ago
- A full-featured open-source Wi-Fi fuzzer☆189Updated last month