Man in the Middle analysis tool for Bluetooth.
☆536Feb 24, 2020Updated 6 years ago
Alternatives and similar repositories for btproxy
Users that are interested in btproxy are comparing it to the libraries listed below
Sorting:
- BtleJuice Bluetooth Smart (LE) Man-in-the-Middle framework☆833Oct 3, 2018Updated 7 years ago
- A Node.js package for BLE (Bluetooth Low Energy) security assessment using Man-in-the-Middle and other attacks☆815Jan 31, 2022Updated 4 years ago
- unix wildcard attacks☆138May 25, 2018Updated 7 years ago
- BLESuite_CLI is a command line tool to enable an easier way to test Bluetooth Low Energy (BLE) devices☆34Aug 1, 2016Updated 9 years ago
- Crack and decrypt BLE encryption☆949Aug 26, 2021Updated 4 years ago
- This repository is DEPRECATED, please use bettercap as this tool has been ported to its BLE modules.☆1,092Feb 19, 2019Updated 7 years ago
- PROJECT DELTA: SDN SECURITY EVALUATION FRAMEWORK☆223Apr 15, 2019Updated 6 years ago
- ☆106Feb 2, 2016Updated 10 years ago
- A simple, low level http/https proxy server with MiTM pranking features.☆51Apr 27, 2015Updated 10 years ago
- DEPRECATED, bettercap developement moved here: https://github.com/bettercap/bettercap☆2,497Feb 27, 2018Updated 8 years ago
- Certified Edible Dinosaurs official CTF toolkit☆119Apr 2, 2018Updated 7 years ago
- ☆168Apr 2, 2017Updated 8 years ago
- Specify targets and run sets of tools against them☆387Apr 23, 2019Updated 6 years ago
- Reverse NTP remote access trojan in python, for penetration testers☆62Oct 11, 2015Updated 10 years ago
- Recon, Subdomain Bruting, Zone Transfers☆229Aug 2, 2016Updated 9 years ago
- BadUSB 2.0 USB-HID MiTM POC☆288Jun 22, 2016Updated 9 years ago
- Fuzzing and Data Manipulation Framework (for GNU/Linux)☆163Mar 6, 2026Updated 2 weeks ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- Universal Serial aBUSe is a project to demonstrate the risks of hardware bypasses of software security by Rogan Dawes at SensePost.☆500Aug 11, 2017Updated 8 years ago
- BLE-Replay is a Bluetooth Low Energy (BLE) peripheral assessment tool☆146Aug 25, 2016Updated 9 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- Malicious HTTP traffic explorer☆723Mar 16, 2023Updated 3 years ago
- The iOS Security Testing Framework☆1,383Oct 25, 2020Updated 5 years ago
- Various pentest scripts☆14Mar 17, 2014Updated 12 years ago
- "Repeater" style XSS post-exploitation tool for mass browser control. Primarily a PoC to show why HttpOnly flag isn't a complete protecti…☆138Dec 22, 2017Updated 8 years ago
- Next-gen BurpSuite penetration testing tool☆462Jan 27, 2016Updated 10 years ago
- A collection of post-exploitation tools for network red teaming.☆138Dec 7, 2018Updated 7 years ago
- An easy-to-deploy virtual machine that can provide flexible man-in-the-middle capabilities.☆205Aug 29, 2016Updated 9 years ago
- CANToolz - framework for black-box CAN network analysis☆313Oct 31, 2017Updated 8 years ago
- The USB host security assessment tool☆286Nov 28, 2018Updated 7 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆378Oct 12, 2020Updated 5 years ago
- A clone (of the basic core) of AFL fuzzer☆74Feb 6, 2016Updated 10 years ago
- Sniffs sensitive data from interface or pcap☆1,819Nov 2, 2023Updated 2 years ago
- ☆17Nov 25, 2015Updated 10 years ago
- ☆27Jul 18, 2017Updated 8 years ago
- An evolutionary knowledge-based fuzzer☆272May 5, 2024Updated last year
- Microsoft Office / COM Object DLL Planting☆15May 14, 2016Updated 9 years ago
- BLESuite is a Python package that provides an easier way to test Bluetooth Low Energy (BLE) device☆190Oct 9, 2020Updated 5 years ago
- A proxy for USB devices, libUSB and gadgetFS - this project is unmaintained, try here: https://github.com/usb-tools/Facedancer☆463Dec 6, 2021Updated 4 years ago