brandonasuncion / Reverse-Engineering-Bluetooth-ProtocolsView external linksLinks
Intercepting Bluetooth device communication and simulating packet responses of an iPhone from a Raspberry Pi 3
☆162Jan 6, 2025Updated last year
Alternatives and similar repositories for Reverse-Engineering-Bluetooth-Protocols
Users that are interested in Reverse-Engineering-Bluetooth-Protocols are comparing it to the libraries listed below
Sorting:
- Various Jeb plugins, including obfuscation restore☆15Jun 3, 2015Updated 10 years ago
- A security write-up about the Paypal API & data leakage☆25May 27, 2016Updated 9 years ago
- A sample vulnerable driver that emulates kernel mode vulnerabilities.☆20Jan 30, 2016Updated 10 years ago
- ☆20Jun 2, 2016Updated 9 years ago
- ☆16Mar 4, 2019Updated 6 years ago
- Wireshark extcap interface for remote wireless captures.☆35Feb 3, 2023Updated 3 years ago
- Blueborne CVE-2017-0785 Android information leak vulnerability☆472Sep 23, 2017Updated 8 years ago
- A lightweight VM for hardware hacking, RE (fuzzing, symEx, exploiting etc) and wargaming tasks☆355Sep 4, 2019Updated 6 years ago
- An offensive Powershell console☆30Dec 5, 2015Updated 10 years ago
- Passively scan for Bluetooth Low Energy devices and attempt to fingerprint them☆167Jul 4, 2023Updated 2 years ago
- HLS OSMF plugin - help to view m3u8 streams in the KDP/V2 player☆14Nov 16, 2020Updated 5 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- Viewstate Hidden Control Enumerator☆17Sep 12, 2013Updated 12 years ago
- USIM, EDITOR, IMSI, ICCID, MCC/MNC, SPN, GID1, GID2☆15Mar 8, 2020Updated 5 years ago
- Conference Papers and Appendicies (USENIX Security, BlackHat, HITBSecConf, and BeVX)☆27Aug 6, 2023Updated 2 years ago
- HID attack payload generator for Arduinos☆166Jul 8, 2024Updated last year
- Slides from previous conference talks☆41May 13, 2017Updated 8 years ago
- Verification Validation and Visualization of Security Policy Abstractions☆45Aug 14, 2023Updated 2 years ago
- ☆26Apr 19, 2017Updated 8 years ago
- A Burp Suite extension that automatically marks similar requests as 'out-of-scope'.☆43May 1, 2020Updated 5 years ago
- BLESuite is a Python package that provides an easier way to test Bluetooth Low Energy (BLE) device☆190Oct 9, 2020Updated 5 years ago
- ☆85Apr 17, 2020Updated 5 years ago
- An open source, embedded, high performance g-code-parser and CNC milling controller written in optimized C that will run on a straight Ar…☆10Jan 7, 2016Updated 10 years ago
- ☆11Aug 2, 2017Updated 8 years ago
- Capstone Engine bindings on PHP 7.0+☆12Sep 22, 2022Updated 3 years ago
- Chrome 扩展,为百度搜索添加必应壁纸。☆11Jun 29, 2015Updated 10 years ago
- Nuclei is a fast tool for configurable targeted vulnerability scanning based on templates offering massive extensibility and ease of use.☆13Aug 4, 2025Updated 6 months ago
- ☆12Apr 13, 2017Updated 8 years ago
- Smartphone-controlled ROV☆13Oct 11, 2020Updated 5 years ago
- PLASMA PULSAR☆70May 19, 2017Updated 8 years ago
- InjectProc - Process Injection Techniques [This project is not maintained anymore]☆998Feb 10, 2019Updated 7 years ago
- A collection of shellcodes for BSD and Linux for exploit development☆26May 13, 2011Updated 14 years ago
- Offline radio signal analyser☆45May 3, 2020Updated 5 years ago
- Linux tool used to extract sensitive data, inject backdoor or drop remote shells on android devices.☆108Apr 13, 2016Updated 9 years ago
- Simple library to spray the Windows Kernel Pool☆110Jan 6, 2020Updated 6 years ago
- DC25 5A1F - Demystifying Windows Kernel Exploitation by Abusing GDI Objects☆148Jul 30, 2017Updated 8 years ago
- ldid and ldid2☆14Jun 25, 2018Updated 7 years ago
- Out-of-tree module for GNU Radio containing a complete OFDM implementation including GUI for reasearch and teaching☆16Mar 4, 2018Updated 7 years ago
- Vulnerability research on the CA UIM Nimbus protocol☆15Sep 28, 2020Updated 5 years ago