USSLab / DolphinAttackLinks
Inaudible Voice Commands
☆110Updated 4 years ago
Alternatives and similar repositories for DolphinAttack
Users that are interested in DolphinAttack are comparing it to the libraries listed below
Sorting:
- Key Negotiation Of Bluetooth (KNOB) attacks on Bluetooth BR/EDR and BLE [CVE-2019-9506]☆187Updated 3 years ago
- BLE-Replay is a Bluetooth Low Energy (BLE) peripheral assessment tool☆147Updated 9 years ago
- "Zero Click" Remote Code Execution in Mycroft AI vocal assistant☆56Updated 7 years ago
- GUI Framework on top of Killerbee☆84Updated 8 years ago
- Proof-of-concept of the KRACK attack against Linux and Android☆157Updated 7 years ago
- nOBEX allows emulating the PBAP, MAP, and HFP profiles to test vehicle infotainment systems and similar devices using these profiles☆94Updated 5 years ago
- BLESuite_CLI is a command line tool to enable an easier way to test Bluetooth Low Energy (BLE) devices☆33Updated 9 years ago
- Let's brute force this hotel's tv.☆82Updated 6 years ago
- An experimental project to demonstrate how a user keyboard input may be sniffed through the pattern analysis of the sounds emitted by the…☆67Updated 9 years ago
- a collection of writeups and tools related to ~embedded device ~hacking☆144Updated 7 years ago
- Attify Badge GUI tool to interact over UART, SPI, JTAG, GPIO etc.☆69Updated 4 years ago
- A portable device that can spoof/emulate any magnetic stripe, credit card or hotel card "wirelessly", even on standard magstripe (non-NFC…☆45Updated 6 years ago
- USBNinja Embedded Software Framework☆60Updated 7 years ago
- Intercepting Bluetooth device communication and simulating packet responses of an iPhone from a Raspberry Pi 3☆162Updated last year
- Audible Electromagnetic Interference Detector - Model ET-1☆14Updated 5 years ago
- ☆38Updated 8 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆38Updated 8 years ago
- Bluetooth Impersonation AttackS (BIAS) [CVE 2020-10135]☆91Updated 4 years ago
- Take full control of a OSX user or root account via command line.☆101Updated 7 years ago
- Selective wifi jammer - control who can connect where☆48Updated 8 years ago
- ☆45Updated 3 weeks ago
- Android application allowing to sniff and inject Zigbee, Mosart and Enhanced ShockBurst packets on a Samsung Galaxy S20☆67Updated 4 years ago
- Passively scan for Bluetooth Low Energy devices and attempt to fingerprint them☆167Updated 2 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆55Updated 8 years ago
- ☆104Updated 4 years ago
- Wireless USB Rubber Ducky triggered via BLE (make your Ubertooth quack!)☆117Updated 7 years ago
- Keystroke injection vulnerabilities in wireless presentation clickers☆96Updated 6 years ago
- Wireless mouse/keyboard attack with replay/transmit poc☆93Updated 9 years ago
- Hackmelock emulator device using node.js bleno☆27Updated 8 years ago
- Bluetooth scanner for local devices that may be vulnerable to Blueborne exploit☆160Updated 8 years ago