brandonasuncion / Reverse-Engineering-Bluetooth-ProtocolsLinks
Intercepting Bluetooth device communication and simulating packet responses of an iPhone from a Raspberry Pi 3
☆158Updated 7 months ago
Alternatives and similar repositories for Reverse-Engineering-Bluetooth-Protocols
Users that are interested in Reverse-Engineering-Bluetooth-Protocols are comparing it to the libraries listed below
Sorting:
- Passively scan for Bluetooth Low Energy devices and attempt to fingerprint them☆162Updated 2 years ago
- Hackable Bluetooth stack in Python☆105Updated 5 years ago
- HARDSPLOIT GUI : The essential security auditing tool for Internet of Things devices you'll need in your toolbox☆39Updated 5 years ago
- ☆122Updated 8 years ago
- Magnetic stripe spoofer implementing audio waves.☆39Updated 8 years ago
- Python libraries for Ubertooth☆54Updated 2 years ago
- Attify Badge GUI tool to interact over UART, SPI, JTAG, GPIO etc.☆69Updated 4 years ago
- Scripts to aid in the manipulation of electromagnetic radiation (for use with gnu_radio and SDR).☆78Updated 7 years ago
- GSM Assessment Toolkit - A security evaluation framework for GSM networks☆74Updated 7 years ago
- A few ZigBee Tools to compliment KillerBee☆54Updated 9 years ago
- Soundcard RFID decoder for 125KHZ HID cards.☆27Updated 9 years ago
- A portable device that can spoof/emulate any magnetic stripe, credit card or hotel card "wirelessly", even on standard magstripe (non-NFC…☆45Updated 6 years ago
- Bluetooth PIN and LINK-KEY Cracker☆50Updated 11 years ago
- !!! Deprecated See ESPloitV2 !!! Original PoC(Released: Sep 11, 2016) - WiFi controlled keystroke injection Using ESP8266 and 32u4 based…☆49Updated 8 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆37Updated 7 years ago
- Fast Wi-Fi hijacker in C, based on AirPwn ideas and LORCON☆22Updated 7 years ago
- Scripts for turning a RaspBerryPi zero into multiple HID devices including, Serial, Ethernet, Storage, HID Keyboard☆66Updated 8 years ago
- A PoC that the USB port is an attack surface for a Mazda car's infotainment system and how Mazda hacks are made☆159Updated 3 years ago
- Sensor software☆68Updated 3 years ago
- Offline radio signal analyser☆44Updated 5 years ago
- Bus Pirate (cross-platform, cleaned up for OS X)☆44Updated 9 years ago
- Def Con 2017 Car Hacking Village Badge☆43Updated 5 years ago
- BLESuite is a Python package that provides an easier way to test Bluetooth Low Energy (BLE) device☆184Updated 4 years ago
- RFID spoofing code from scanlime.org☆20Updated 12 years ago
- tumbleRF: a unified fuzzing framework for low-level RF and HW protocol/PHY/MAC analysis☆162Updated 7 years ago
- GPS Spoofer Catcher, the GPS IDS.☆89Updated 8 years ago
- BLEBoy is a training tool to teach users about BLE security by providing a single BLE peripheral that can be used to experiment with each…☆43Updated 5 years ago
- A collection of Teensy 2.0 (C) and PC (C#) files allowing on-the-fly simulation of USB peripherals from a PC.☆49Updated 12 years ago
- Broadpwn bug (CVE-2017-9417)☆51Updated 7 years ago
- Ubertooth library for Android☆40Updated 12 years ago