conorpp / btproxy
Man in the Middle analysis tool for Bluetooth.
☆517Updated 4 years ago
Alternatives and similar repositories for btproxy:
Users that are interested in btproxy are comparing it to the libraries listed below
- BtleJuice Bluetooth Smart (LE) Man-in-the-Middle framework☆767Updated 6 years ago
- Crack and decrypt BLE encryption☆865Updated 3 years ago
- A Node.js package for BLE (Bluetooth Low Energy) security assessment using Man-in-the-Middle and other attacks☆726Updated 3 years ago
- This repository is DEPRECATED, please use bettercap as this tool has been ported to its BLE modules.☆1,095Updated 5 years ago
- Hackable Bluetooth stack in Python☆102Updated 5 years ago
- IEEE 802.15.4/ZigBee Security Research Toolkit☆776Updated last year
- BLESuite is a Python package that provides an easier way to test Bluetooth Low Energy (BLE) device☆181Updated 4 years ago
- Blueborne CVE-2017-0785 Android information leak vulnerability☆466Updated 7 years ago
- PoC scripts demonstrating the BlueBorne vulnerabilities☆593Updated 3 years ago
- BadUSB 2.0 USB-HID MiTM POC☆283Updated 8 years ago
- Fake wireless Access Point (AP) implementation using Python and Scapy, intended for convenient testing of 802.11 protocols and implementa…☆246Updated 9 years ago
- ☆119Updated 8 years ago
- A tool for passive data capture and reconnaissance of serial flash chips. It is used in conjunction with a Saleae logic analyzer to recon…☆287Updated last year
- Plug-and-play bash script for sniffing 802.11 probes requests☆249Updated 6 years ago
- Bluetooth experimentation framework for Broadcom and Cypress chips.☆703Updated 5 months ago
- ☆466Updated 5 months ago
- A proxy for USB devices, libUSB and gadgetFS - this project is unmaintained, try here: https://github.com/usb-tools/Facedancer☆448Updated 3 years ago
- ☠ Man-in-the-middle wireless access point inside a docker container 🐳☆447Updated 6 years ago
- Mallory - MiTM TCP and UDP Proxy☆314Updated 2 years ago
- This repository contains some bettercap transparent proxy example modules.☆282Updated 6 years ago
- Create fake AP in Kali with 1 command☆268Updated 9 years ago
- Key Negotiation Of Bluetooth (KNOB) attacks on Bluetooth BR/EDR and BLE [CVE-2019-9506]☆179Updated 2 years ago
- Universal Serial aBUSe is a project to demonstrate the risks of hardware bypasses of software security by Rogan Dawes at SensePost.☆493Updated 7 years ago
- Metaphor - Stagefright with ASLR bypass☆314Updated 8 years ago
- BLE-Replay is a Bluetooth Low Energy (BLE) peripheral assessment tool☆129Updated 8 years ago
- Bluetooth scanner for local devices that may be vulnerable to Blueborne exploit☆152Updated 7 years ago
- ☆106Updated 9 years ago
- The USB host security assessment tool☆276Updated 6 years ago
- Patch Binaries via MITM: BackdoorFactory + mitmProxy.☆995Updated 3 years ago
- A Bluetooth Low Energy device for interfacing with Wiegand☆257Updated 7 years ago