fO-000 / bluingLinks
An intelligence gathering tool for hacking Bluetooth
☆829Updated 2 years ago
Alternatives and similar repositories for bluing
Users that are interested in bluing are comparing it to the libraries listed below
Sorting:
- HomePwn - Swiss Army Knife for Pentesting of IoT Devices☆913Updated 2 years ago
- List of Bluetooth BR/EDR/LE security resources☆568Updated last year
- A Series of Baseband & LMP Exploits against Bluetooth Classic Controllers☆505Updated 11 months ago
- RomBuster is a router exploitation tool that allows to disclosure network router admin password.☆520Updated last year
- Bluetooth hacking tools☆444Updated 2 years ago
- CamOver is a camera exploitation tool that allows to disclosure network camera admin password.☆554Updated last year
- Automated WPA/WPA2 PSK attack tool.☆578Updated 4 years ago
- A sniffer for Bluetooth 5 and 4.x LE☆1,012Updated last month
- Powerful framework for rogue access point attack.☆2,258Updated last year
- A framework for pentesters that facilitates evil twin attacks as well as exploiting other wifi vulnerabilities☆318Updated last year
- MDK4☆715Updated last year
- Proof of Concept of Sweyntooth Bluetooth Low Energy (BLE) vulnerabilities.☆309Updated 3 years ago
- Script for quick and easy DOS-attacks on bluetooth devices for pentest purposes☆646Updated last year
- A Wireless (WPA/WPA2) Pentest/Cracking tool. Captures & Crack 4-way handshake and PMKID key. Also, supports a deauthentication/jammer mod…☆1,031Updated 4 years ago
- BlueToolkit is an extensible Bluetooth Classic vulnerability testing framework that helps uncover new and old vulnerabilities in Bluetoo…☆511Updated 3 weeks ago
- Update Version 3.1 added free SMS messaging.☆491Updated 3 years ago
- Bluetooth hack, forked from https://gitlab.com/kalilinux/packages/bluesnarfer/☆238Updated last year
- CamRaptor is a tool that exploits several vulnerabilities in popular DVR cameras to obtain network camera credentials.☆227Updated last year
- Drone pentesting framework console☆1,589Updated 9 months ago
- Every device has a limit on the size of the L2CAP ping. If it gets an L2CAP ping packet, which is beyond the limit of the size, it will c…☆22Updated 4 years ago
- Kage is Graphical User Interface for Metasploit Meterpreter and Session Handler☆1,222Updated 2 years ago
- Exploitation Framework for ATtiny85 Based HID Attacks☆355Updated 5 years ago
- GsmEvil 2☆351Updated 2 years ago
- The CAN Injection Toolkit☆286Updated 4 months ago
- Bluetooth experimentation framework for Broadcom and Cypress chips.☆743Updated last year
- Drone Hacking Tool is a GUI tool that works with a USB Wifi adapter and HackRF One for hacking drones.☆585Updated 2 years ago
- Next-Gen GUI-based WiFi and Bluetooth Analyzer for Linux☆1,377Updated last year
- Bluetooth Forward and Future Secrecy Attacks and Defenses (BLUFFS) [CVE 2023-24023]☆517Updated last year
- PENIOT: Penetration Testing Tool for IoT☆224Updated 3 years ago
- A simple script that makes possible BLE deauthentication!☆189Updated 2 years ago