Script for quick and easy DOS-attacks on bluetooth devices for pentest purposes
☆673Jan 29, 2024Updated 2 years ago
Alternatives and similar repositories for BLUETOOTH-DOS-ATTACK-SCRIPT
Users that are interested in BLUETOOTH-DOS-ATTACK-SCRIPT are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Bluetooth DOS Attack Script for Educational Purposes. Used in School Project☆168Jan 7, 2022Updated 4 years ago
- A collection of awesome penetration testing resources, tools and other shiny things☆12Feb 15, 2021Updated 5 years ago
- Every device has a limit on the size of the L2CAP ping. If it gets an L2CAP ping packet, which is beyond the limit of the size, it will c…☆23Jan 25, 2026Updated 2 months ago
- Bluetooth dos☆15Mar 8, 2019Updated 7 years ago
- Bluestrike: CLI tool to hack Bluetooth devices through speaker jamming, traffic spoofing & device hijacking (In the making)☆403Jan 3, 2024Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- List of Bluetooth BR/EDR/LE security resources☆597Oct 3, 2025Updated 5 months ago
- A simple script that makes possible BLE deauthentication!☆313Sep 29, 2022Updated 3 years ago
- This is very usefull bluetooth jammer or doser tool in kali or parrot linux...☆166May 12, 2019Updated 6 years ago
- Bluetooth/BLE jamming, signal inhibition, DoS and DeAuth attack.☆334Oct 16, 2025Updated 5 months ago
- Proof of Concept of Sweyntooth Bluetooth Low Energy (BLE) vulnerabilities.☆325Nov 23, 2021Updated 4 years ago
- A Series of Baseband & LMP Exploits against Bluetooth Classic Controllers☆552Aug 31, 2024Updated last year
- [Under Development] This is a modification to the Ubertooth One firmware developed by Great Scott Gadgets. The modified firmware is able …☆22Feb 22, 2022Updated 4 years ago
- Social Engineering Attack Using Phishing in a Local Area Wi-Fi by Creating an Access Point and DNS Manipulation☆13Nov 25, 2021Updated 4 years ago
- l2ping with threads to flood attack bluetooth devices☆107Mar 12, 2026Updated 2 weeks ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- An intelligence gathering tool for hacking Bluetooth☆990Apr 23, 2023Updated 2 years ago
- Script for quick and easy DOS-attacks on bluetooth devices for pentest purposes☆42Aug 21, 2023Updated 2 years ago
- ✨ Purpose only! The dangers of Bluetooth Low Energy(BLE)implementations: Unveiling zero day vulnerabilities and security flaws in modern …☆344May 27, 2024Updated last year
- PoC to record audio from a Bluetooth device☆1,573Apr 4, 2024Updated last year
- Bluetooth spoofing to grab the connection between two paired bluetooth devices.☆13Aug 3, 2020Updated 5 years ago
- [EN] Python script to jam bluetooth devices on area☆18Dec 20, 2022Updated 3 years ago
- Bluetooth hacking tools☆479Apr 20, 2023Updated 2 years ago
- A tool which perform deauthentication attack on unpaired bluetooth devices.☆52Aug 30, 2025Updated 6 months ago
- Annoying bluetooth DoS "jammer"☆235Nov 12, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- 🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard…☆1,806Feb 11, 2026Updated last month
- Explore the realm of Bluetooth Penetration Testing through our comprehensive website. Learn about different techniques, tools, and best p…☆27Aug 28, 2024Updated last year
- Bluetooth hack, forked from https://gitlab.com/kalilinux/packages/bluesnarfer/☆251Jan 8, 2024Updated 2 years ago
- En este repositorio podemos encontrar una cantidad de virus para android y Windows programados en Python☆12Jun 27, 2022Updated 3 years ago
- Steghide is a steganography program that is able to hide data in various kinds of image- and audio-files. The color- respectivly sample-f…☆47Apr 23, 2021Updated 4 years ago
- BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy [CVE-2020-15802] [CVE-2022-20361]☆19Aug 17, 2022Updated 3 years ago
- A jammer project done during the Science Hack Day Berlin 2018☆129Nov 4, 2018Updated 7 years ago
- ☆16Nov 11, 2022Updated 3 years ago
- A python script file to crack encrypted .zip files using a dictionary attack, a hash attack, or a alphanumeric brute force attack.☆11Nov 2, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Custom firmware for nrf52840-dongle, allowing to easily eavesdrop Bluetooth Low Energy communications and perform multiple active attacks…☆68Jun 23, 2022Updated 3 years ago
- A bluetooth control script for all your Bluetooth devices DoS needs.☆108May 7, 2024Updated last year
- Herramienta orientada a pentesting en la zona bluetooth.☆22Jun 26, 2024Updated last year
- ☆4,729Mar 12, 2026Updated 2 weeks ago
- ESP32 + NRF24L01 2.4 GHz noise generator, designed to jam Bluetooth☆16Jan 28, 2023Updated 3 years ago
- BlueToolkit is an extensible Bluetooth Classic vulnerability testing framework that helps uncover new and old vulnerabilities in Bluetoo…☆671Mar 5, 2026Updated 3 weeks ago
- Herramienta para spamear correos electrónicos creada con Python y SMTP, se necesita un correo electrónico de Outlook para poder usar la h…☆16May 1, 2023Updated 2 years ago