francozappa / biasView external linksLinks
Bluetooth Impersonation AttackS (BIAS) [CVE 2020-10135]
☆92Jun 16, 2021Updated 4 years ago
Alternatives and similar repositories for bias
Users that are interested in bias are comparing it to the libraries listed below
Sorting:
- Key Negotiation Of Bluetooth (KNOB) attacks on Bluetooth BR/EDR and BLE [CVE-2019-9506]☆187Apr 4, 2022Updated 3 years ago
- BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy [CVE-2020-15802] [CVE-2022-20361]☆19Aug 17, 2022Updated 3 years ago
- Proof of Concept of Sweyntooth Bluetooth Low Energy (BLE) vulnerabilities.☆322Nov 23, 2021Updated 4 years ago
- PoC for extracting office files into PDF file metadata☆11Sep 11, 2019Updated 6 years ago
- A Series of Baseband & LMP Exploits against Bluetooth Classic Controllers☆540Aug 31, 2024Updated last year
- [Under Development] This is a modification to the Ubertooth One firmware developed by Great Scott Gadgets. The modified firmware is able …☆22Feb 22, 2022Updated 3 years ago
- Smartcard APDU interception and MITM for one smartcard model☆38Mar 2, 2018Updated 7 years ago
- MitM proxy for modifying NFC APDUs on the fly, for use with NFCGate☆21Aug 6, 2015Updated 10 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆24Apr 21, 2021Updated 4 years ago
- Wireshark dissector for Broadcom specific H4 diagnostic commands☆25Jan 6, 2023Updated 3 years ago
- Configure SPI flash write protection.☆24May 11, 2020Updated 5 years ago
- Broadcom and Cypress firmware emulation for fuzzing and further full-stack debugging☆456Feb 7, 2024Updated 2 years ago
- Document created to serve as a first step to learn about blockchain and smart contract security.☆19Sep 20, 2021Updated 4 years ago
- scapy-radio (from original Hg repo)☆89Feb 27, 2023Updated 2 years ago
- Github Pages☆13May 22, 2023Updated 2 years ago
- Blue Hydra☆95Dec 4, 2024Updated last year
- Reverse-HTTP Redirector via DigitalOcean Apps Platform☆31Aug 16, 2023Updated 2 years ago
- ☆13Oct 29, 2024Updated last year
- Lima Installer was a web based Cydia alternative which was based around a central server system☆10Mar 23, 2024Updated last year
- ☆11Feb 5, 2026Updated last week
- An Android wrapper for Arc☆11May 13, 2018Updated 7 years ago
- A sniffer for Bluetooth 5 and 4.x LE☆1,091Sep 25, 2025Updated 4 months ago
- BtleJuice Bluetooth Smart (LE) Man-in-the-Middle framework☆830Oct 3, 2018Updated 7 years ago
- BLESuite is a Python package that provides an easier way to test Bluetooth Low Energy (BLE) device☆190Oct 9, 2020Updated 5 years ago
- Bluetooth Low Energy Swiss-army knife☆2,072Aug 4, 2024Updated last year
- BLEDiff is an automated, scalable, property-agnostic, and black-box protocol noncompliance checker for BLE devices.☆13Mar 31, 2023Updated 2 years ago
- Tools for communicating with Intel Management Engine through MEI (HECI)☆13Jul 27, 2017Updated 8 years ago
- A kernel module to read/write QFPROM rows on Qualcomm SoC devices with TCP server support.☆15Mar 30, 2016Updated 9 years ago
- The best iPhone unlocker.☆17Dec 11, 2023Updated 2 years ago
- Example of a serverless web reconaissance workflow's AWS architecture.☆11Feb 25, 2023Updated 2 years ago
- Java Card applet with REFRESH command support for SIM Toolkit application☆17Aug 2, 2020Updated 5 years ago
- A standalone python script leveraging ntdll for UEFI variable enumeration. This uses elements from the "chipsec" toolkit for formatting w…☆10Jul 25, 2023Updated 2 years ago
- Hardware and support board schematics☆16Nov 10, 2016Updated 9 years ago
- IEEE 802.15.4/ZigBee Security Research Toolkit☆831Sep 12, 2023Updated 2 years ago
- ✨ Purpose only! The dangers of Bluetooth Low Energy(BLE)implementations: Unveiling zero day vulnerabilities and security flaws in modern …☆341May 27, 2024Updated last year
- Pythonize Intruder Payload☆13Dec 15, 2020Updated 5 years ago
- A PowerShell script to prevent Sysmon from writing its events☆16Apr 23, 2020Updated 5 years ago
- Penetration testing framework for ZigBee security research.☆119Dec 22, 2017Updated 8 years ago
- Automated Analysis of Privacy Policies☆13Jul 27, 2020Updated 5 years ago