Intercepting Bluetooth device communication and simulating packet responses of an iPhone from a Raspberry Pi 3
☆162Jan 6, 2025Updated last year
Alternatives and similar repositories for Reverse-Engineering-Bluetooth-Protocols
Users that are interested in Reverse-Engineering-Bluetooth-Protocols are comparing it to the libraries listed below
Sorting:
- Wireshark extcap interface for remote wireless captures.☆35Feb 3, 2023Updated 3 years ago
- Various Jeb plugins, including obfuscation restore☆15Jun 3, 2015Updated 10 years ago
- BLESuite_CLI is a command line tool to enable an easier way to test Bluetooth Low Energy (BLE) devices☆34Aug 1, 2016Updated 9 years ago
- Strutsy - Mass exploitation of Apache Struts (CVE-2017-5638) vulnerability☆10Sep 1, 2018Updated 7 years ago
- A sample vulnerable driver that emulates kernel mode vulnerabilities.☆20Jan 30, 2016Updated 10 years ago
- Allows external systems or MCUs to connect BLE (CC2540) using HCI as BLE Central Role☆11Jul 1, 2015Updated 10 years ago
- MS17-010 multithreading scanner written in python.☆75May 20, 2017Updated 8 years ago
- ☆20Jun 2, 2016Updated 9 years ago
- A security write-up about the Paypal API & data leakage☆25May 27, 2016Updated 9 years ago
- Slides from previous conference talks☆41May 13, 2017Updated 8 years ago
- Custom Deserializer☆13Feb 1, 2017Updated 9 years ago
- Simple library to spray the Windows Kernel Pool☆110Jan 6, 2020Updated 6 years ago
- Blueborne CVE-2017-0785 Android information leak vulnerability☆471Sep 23, 2017Updated 8 years ago
- ☆12Apr 13, 2017Updated 8 years ago
- PLASMA PULSAR☆70May 19, 2017Updated 8 years ago
- Pentest tools for Windows hacking processes☆13May 2, 2017Updated 8 years ago
- InjectProc - Process Injection Techniques [This project is not maintained anymore]☆996Feb 10, 2019Updated 7 years ago
- rp++ is a full-cpp written tool that aims to find ROP sequences in PE/Elf/Mach-O x86/x64 binaries. It is open-source and has been tested …☆11Apr 2, 2016Updated 9 years ago
- Viewstate Hidden Control Enumerator☆17Sep 12, 2013Updated 12 years ago
- HLS OSMF plugin - help to view m3u8 streams in the KDP/V2 player☆14Nov 16, 2020Updated 5 years ago
- Use back camera capturing make WeChat's message content page's background transparent☆12Aug 17, 2016Updated 9 years ago
- An offensive Powershell console☆30Dec 5, 2015Updated 10 years ago
- ☆16Mar 4, 2019Updated 7 years ago
- A lightweight VM for hardware hacking, RE (fuzzing, symEx, exploiting etc) and wargaming tasks☆355Sep 4, 2019Updated 6 years ago
- Verification Validation and Visualization of Security Policy Abstractions☆45Aug 14, 2023Updated 2 years ago
- A TCP proxy over named pipes. Originally created for maintaining a meterpreter session over 445 for less network alarms.☆244Sep 13, 2021Updated 4 years ago
- Capstone Engine bindings on PHP 7.0+☆12Sep 22, 2022Updated 3 years ago
- Some xposed modules☆16Nov 27, 2018Updated 7 years ago
- adversarial machine learning for anti-malware software☆12May 17, 2018Updated 7 years ago
- Nili is a Tool for Network Scan, Man in the Middle, Protocol Reverse Engineering and Fuzzing.☆217Oct 23, 2019Updated 6 years ago
- Break and Elevation of Privilege the API v2 using JSON Web Token (JWT)☆15Jul 8, 2017Updated 8 years ago
- CVE-2017-9791☆27Jul 8, 2017Updated 8 years ago
- Wireshark captures in Windows using the WLANPi as an adapter☆13Oct 15, 2019Updated 6 years ago
- Linux tool used to extract sensitive data, inject backdoor or drop remote shells on android devices.☆109Apr 13, 2016Updated 9 years ago
- CVE-2017-7494 - Detection Scripts☆63May 26, 2017Updated 8 years ago
- Conference Papers and Appendicies (USENIX Security, BlackHat, HITBSecConf, and BeVX)☆27Aug 6, 2023Updated 2 years ago
- Passively scan for Bluetooth Low Energy devices and attempt to fingerprint them☆168Jul 4, 2023Updated 2 years ago
- Chrome 扩展,为百度搜索添加必应壁纸。☆11Jun 29, 2015Updated 10 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago