TarlogicSecurity / BSAMLinks
Bluetooth Security Assessment Methodology
☆133Updated last year
Alternatives and similar repositories for BSAM
Users that are interested in BSAM are comparing it to the libraries listed below
Sorting:
- Wireless Hacking Devices Protocol client☆231Updated this week
- ☆217Updated last year
- Moxie scans & tests MQTT services. Secure your IoT infrastructure!☆47Updated last year
- Full Build Guide for making your own RFID Gooseneck Long Range Reader!☆54Updated last month
- ☆127Updated last year
- Deluder is a tool for intercepting traffic of proxy unaware applications. Currently, Deluder supports OpenSSL, GnuTLS, SChannel, WinSock …☆203Updated 11 months ago
- PETEP (PEnetration TEsting Proxy) is an open-source Java application for traffic analysis & modification using TCP/UDP proxies. PETEP is …☆216Updated last year
- Apple BLE proximity pairing message spoofing☆19Updated 2 years ago
- Postman OSINT tool to extract creds, token, username, email & more from Postman Public Workspaces☆163Updated 4 months ago
- QRFuzz, a fuzzing toolkit to test malicious QR Codes in mobile applications☆46Updated last year
- ☆22Updated 10 months ago
- External Playbooks for Public Access☆39Updated 7 months ago
- 🚀 A powerful multi-platform RF toolbox that deploys specialized radio tools in seconds on Linux, Windows, and macOS—supporting x86_64, A…☆228Updated this week
- Hardware Hacking Cheatsheet infograph☆154Updated last year
- ☆57Updated 6 years ago
- OSDP attack tool (and the Elvish word for friend)☆101Updated 2 years ago
- This is a simple bash script to fix errors with apt update, upgrade MetaSploit and run some upgrades to improve the system usability with…☆102Updated last year
- The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility t…☆111Updated last month
- PwnPad is an affordable, hands-on hardware hacking platform built for practical learning. It features a range of challenges that walk use…☆118Updated 2 months ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆148Updated last year
- ☆192Updated 2 years ago
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆92Updated last year
- Script to parse Aircrack-ng captures into a SQLite database and extract useful information like handshakes, MGT identities, interesting r…☆111Updated 9 months ago
- Wi-Fi Framework for creating proof-of-concepts, automated experiments, test suites, fuzzers, and more.☆239Updated 4 months ago
- Upload files done during my research.☆165Updated 5 months ago
- Hardware Hacking ES Comunidad☆114Updated last year
- REplay is a reverse engineering playground that has 3 separate levels and acts as a fancy little playground mimicking real world reverse …☆16Updated last year
- Discover Non-Discoverable Bluetooth Classic devices☆11Updated 11 months ago
- Interactive terminal based tool to configure a Raspberry Pi into a transparent Wifi based proxy with traffic tunnelling support☆29Updated last year
- ☆116Updated 2 years ago