A Bluetooth low energy capture the flag
☆747Mar 14, 2026Updated last week
Alternatives and similar repositories for ble_ctf
Users that are interested in ble_ctf are comparing it to the libraries listed below
Sorting:
- Advanced: Bluetooth low energy capture the flag☆65Aug 4, 2023Updated 2 years ago
- tumbleRF: a unified fuzzing framework for low-level RF and HW protocol/PHY/MAC analysis☆164Mar 15, 2018Updated 8 years ago
- Android Automation Tool☆21May 9, 2018Updated 7 years ago
- ANWI - All New Wireless IDS☆29Aug 3, 2018Updated 7 years ago
- Pre-OS microcode updater☆43Aug 25, 2018Updated 7 years ago
- This repository is DEPRECATED, please use bettercap as this tool has been ported to its BLE modules.☆1,092Feb 19, 2019Updated 7 years ago
- Bluetooth Low Energy Swiss-army knife☆2,079Aug 4, 2024Updated last year
- Rhme2 challenge (2016)☆330Jun 12, 2017Updated 8 years ago
- A Curated list of Security Resources for all connected things☆3,210Mar 7, 2026Updated last week
- Crack and decrypt BLE encryption☆949Aug 26, 2021Updated 4 years ago
- Platform Firmware Auditing Tool☆131Sep 7, 2018Updated 7 years ago
- BtleJuice Bluetooth Smart (LE) Man-in-the-Middle framework☆833Oct 3, 2018Updated 7 years ago
- A fork and successor of the Sulley Fuzzing Framework☆2,323Feb 15, 2026Updated last month
- An Android app that lets you use your access control card cloning devices in the field.☆484Jul 27, 2019Updated 6 years ago
- The Damn Vulnerable Router Firmware Project☆712Apr 7, 2021Updated 4 years ago
- A sniffer for Bluetooth 5 and 4.x LE☆1,101Sep 25, 2025Updated 5 months ago
- A Node.js package for BLE (Bluetooth Low Energy) security assessment using Man-in-the-Middle and other attacks☆815Jan 31, 2022Updated 4 years ago
- Kinda useful notes collated together publicly☆500May 29, 2019Updated 6 years ago
- Proof of Concept of Sweyntooth Bluetooth Low Energy (BLE) vulnerabilities.☆324Nov 23, 2021Updated 4 years ago
- Armory is a tool meant to take in a lot of external and discovery data from a lot of tools, add it to a database and correlate all of rel…☆425Mar 13, 2026Updated last week
- Firmware Analysis and Comparison Tool☆1,430Updated this week
- Discovering vulnerabilities in firmware through concolic analysis and function clustering.☆479Sep 17, 2020Updated 5 years ago
- Script for searching the extracted firmware file system for goodies!☆1,196Aug 29, 2023Updated 2 years ago
- ☆56Aug 30, 2022Updated 3 years ago
- JTAGulator: Assisted discovery of on-chip debug interfaces☆770Jul 29, 2025Updated 7 months ago
- [BHUSA 2018 Arsenal] Integrated tool to analyze Drive-by Download attack☆107Jan 6, 2023Updated 3 years ago
- IoTGoat is a deliberately insecure firmware based on OpenWrt.☆185Mar 29, 2020Updated 5 years ago
- TROMMEL: Sift Through Embedded Device Files to Identify Potential Vulnerable Indicators☆214Jun 23, 2020Updated 5 years ago
- Windows / Linux Local Privilege Escalation Workshop☆1,004Jan 15, 2019Updated 7 years ago
- IEEE 802.15.4/ZigBee Security Research Toolkit☆835Sep 12, 2023Updated 2 years ago
- Toolkit to emulate firmware and analyse it for security vulnerabilities☆1,540Sep 16, 2024Updated last year
- IoTGoat is a deliberately insecure firmware created to educate software developers and security professionals with testing commonly foun…☆875Oct 5, 2025Updated 5 months ago
- Tool for introspection of SSL\TLS sessions☆146Updated this week
- ✨ Purpose only! The dangers of Bluetooth Low Energy(BLE)implementations: Unveiling zero day vulnerabilities and security flaws in modern …☆344May 27, 2024Updated last year
- Course materials for Modern Binary Exploitation by RPISEC☆5,950Dec 9, 2021Updated 4 years ago
- List of Bluetooth BR/EDR/LE security resources☆597Oct 3, 2025Updated 5 months ago
- Burp extension to help developers replicate findings from pen tests☆70Jul 22, 2024Updated last year
- A curated list of awesome embedded and IoT security resources.☆2,241Oct 17, 2023Updated 2 years ago
- ChipWhisperer - the complete open-source toolchain for side-channel power analysis and glitching attacks☆1,436Feb 25, 2026Updated 3 weeks ago