Bluetooth Forward and Future Secrecy Attacks and Defenses (BLUFFS) [CVE 2023-24023]
☆520Jan 24, 2024Updated 2 years ago
Alternatives and similar repositories for bluffs
Users that are interested in bluffs are comparing it to the libraries listed below
Sorting:
- A Series of Baseband & LMP Exploits against Bluetooth Classic Controllers☆546Aug 31, 2024Updated last year
- Proof of Concept of Sweyntooth Bluetooth Low Energy (BLE) vulnerabilities.☆323Nov 23, 2021Updated 4 years ago
- Key Negotiation Of Bluetooth (KNOB) attacks on Bluetooth BR/EDR and BLE [CVE-2019-9506]☆187Apr 4, 2022Updated 3 years ago
- An intelligence gathering tool for hacking Bluetooth☆985Apr 23, 2023Updated 2 years ago
- BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy [CVE-2020-15802] [CVE-2022-20361]☆19Aug 17, 2022Updated 3 years ago
- ✨ Purpose only! The dangers of Bluetooth Low Energy(BLE)implementations: Unveiling zero day vulnerabilities and security flaws in modern …☆343May 27, 2024Updated last year
- ☆15Aug 3, 2023Updated 2 years ago
- PoC to record audio from a Bluetooth device☆1,566Apr 4, 2024Updated last year
- List of Bluetooth BR/EDR/LE security resources☆592Oct 3, 2025Updated 5 months ago
- A tool for performing relay attacks on RFID/NFC systems (ISO 14443-4A)☆29Nov 24, 2022Updated 3 years ago
- BlueToolkit is an extensible Bluetooth Classic vulnerability testing framework that helps uncover new and old vulnerabilities in Bluetoo…☆657Aug 29, 2025Updated 6 months ago
- A MBR Fuzzer☆31Apr 3, 2024Updated last year
- Schematic for an ultrasonic jammer that produces noise at 20kHz, around the range of the iPhone MEMS microphone. It's a way to non-invasi…☆18Aug 19, 2020Updated 5 years ago
- Towards Universal Fuzzing of IoT Protocols.☆101Jul 4, 2025Updated 8 months ago
- Active Bluetooth BR/EDR Sniffer/Injector as cheap as any ESP32 board can get. Works with Scapy ;-)☆582May 10, 2023Updated 2 years ago
- 5G NR Attacks against Qualcomm and Mediatek smartphones. Fuzzer included⚡☆633Nov 21, 2025Updated 3 months ago
- Bluetooth experimentation framework for Broadcom and Cypress chips.☆763Aug 21, 2024Updated last year
- L2Fuzz Source Code☆44Dec 15, 2023Updated 2 years ago
- Bluetooth Impersonation AttackS (BIAS) [CVE 2020-10135]☆94Jun 16, 2021Updated 4 years ago
- Collection of Ghidra convenience VR scripts☆12Dec 14, 2024Updated last year
- Tool for discovering and de-anonymizing Classic Bluetooth connections☆54Apr 4, 2020Updated 5 years ago
- This is a small POC running on an ESP32, exploiting CVE-2022-42722 to crash Linux devices over the air.☆80Oct 15, 2022Updated 3 years ago
- A 5G Sniffer and Downlink Injector Framework on steroids... And yes, Wireshark supported!!!☆276Feb 19, 2026Updated 2 weeks ago
- EMBA - The firmware security analyzer☆3,371Feb 26, 2026Updated last week
- Toolkit developed to reverse engineer Google's Nearby Connections API☆23Dec 11, 2018Updated 7 years ago
- CVE-2023-45866 - BluetoothDucky implementation (Using DuckyScript)☆12Jan 15, 2024Updated 2 years ago
- MacStealer: Wi-Fi Client Isolation Bypass☆533Dec 17, 2025Updated 2 months ago
- 🚀 A powerful multi-platform RF toolbox that deploys specialized radio, hardware, and other security tools in seconds on Linux, Windows, …☆286Feb 24, 2026Updated last week
- Screen eavesdrop in real time leveraging SDR and pure Julia implementation !☆28Feb 24, 2026Updated last week
- A full-featured open-source Wi-Fi fuzzer☆197Sep 30, 2025Updated 5 months ago
- Wireshark-compatible all-channel BLE sniffer for bladeRF, with wideband Bluetooth sniffing for HackRF and USRP☆402Nov 23, 2025Updated 3 months ago
- Map 2G/3G/4G and more cellular networks in real live with a simple smart phone, pretty much like osmocomBB monitoring feature.☆169Dec 16, 2025Updated 2 months ago
- Wi-Fi Framework for creating proof-of-concepts, automated experiments, test suites, fuzzers, and more.☆251Apr 18, 2025Updated 10 months ago
- details about DIAL protocol vulnerabilities☆29Nov 24, 2023Updated 2 years ago
- 🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard…☆1,781Feb 11, 2026Updated 3 weeks ago
- ☆10Feb 4, 2024Updated 2 years ago
- tumbleRF: a unified fuzzing framework for low-level RF and HW protocol/PHY/MAC analysis☆164Mar 15, 2018Updated 7 years ago
- KeyTrap (DNSSEC)☆44Feb 18, 2024Updated 2 years ago
- M5Stack GSM Wardriver☆19Apr 22, 2023Updated 2 years ago