Advanced: Bluetooth low energy capture the flag
☆65Aug 4, 2023Updated 2 years ago
Alternatives and similar repositories for ble_ctf_infinity
Users that are interested in ble_ctf_infinity are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Bluetooth low energy capture the flag☆754Mar 26, 2026Updated 2 weeks ago
- I have taken all of the challenges from Protostar - https://exploit-exercises.com/protostar/- and compiled them for the ARM architecture.…☆25Apr 7, 2015Updated 11 years ago
- ☆14Sep 2, 2020Updated 5 years ago
- A list of resources for those interested in hardware, embedded, and IoT security☆77Oct 6, 2024Updated last year
- OWASP Embedded Application Security Project☆18Jan 17, 2022Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Spins up a docker container with several useful tools for offensive security in macOS/cloud environments. Also installs the needed depend…☆18Nov 3, 2021Updated 4 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Aug 16, 2022Updated 3 years ago
- This will be a wiki when it grows up, if it grows up☆95Aug 11, 2025Updated 7 months ago
- HTML smuggling is not an evil, it can be useful☆14Jan 28, 2023Updated 3 years ago
- ☆23Jun 22, 2024Updated last year
- Small project to capture BLE data from a xiaomi hygrometer-thermometer.☆19Aug 29, 2020Updated 5 years ago
- ☆10Apr 11, 2023Updated 2 years ago
- GitLab Attack TOolkit☆34Oct 8, 2025Updated 6 months ago
- Internet-of-Things (IoT) hacking lab exercise as showcased at RSA 2018, Hack NYC, and Hack the Capital☆33Jun 28, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- The BUSSide☆19Oct 10, 2021Updated 4 years ago
- Damn Vulnerable IoT Device☆218Feb 12, 2024Updated 2 years ago
- Generate WWVB timecodes for any desired time☆10Sep 8, 2025Updated 7 months ago
- ☆72Jul 24, 2025Updated 8 months ago
- Binary matching with Binary Ninja☆22Jul 8, 2024Updated last year
- Checks SSL/TLS certificates for potential malicious connections by detecting and blocking certificates used by botnet command and control…☆36Dec 15, 2025Updated 3 months ago
- ☆22Oct 24, 2016Updated 9 years ago
- IoTGoat is a deliberately insecure firmware created to educate software developers and security professionals with testing commonly foun…☆881Oct 5, 2025Updated 6 months ago
- An ARM disassembler written in Python that also generates pseudo-code☆16Jan 6, 2017Updated 9 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆43Apr 23, 2024Updated last year
- ☆24Feb 15, 2013Updated 13 years ago
- Ansible module for OWASP ZAP using Python API to scan web targets for security issues☆15Dec 3, 2017Updated 8 years ago
- Repo for CSAW CTF 2018 Quals challenges☆44Sep 17, 2017Updated 8 years ago
- This is a scapy-based Python performance art piece. It creates a little magic on the internet by pretending to portscan from random netwo…☆39Mar 14, 2019Updated 7 years ago
- Threadless Injection Payload Toolkit☆12Oct 12, 2023Updated 2 years ago
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆94Jan 14, 2026Updated 2 months ago
- JXA script based on research by Jeff Johnson on leveraging TextEdit to remove quarantine attributes on files. Jeff's original research is…☆17Jan 31, 2021Updated 5 years ago
- ☆11Oct 13, 2019Updated 6 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- example files to follow the MOOC on RTL-SDR☆12Mar 18, 2017Updated 9 years ago
- ☆39May 31, 2024Updated last year
- ☆11Mar 18, 2018Updated 8 years ago
- r2yara - Module for Yara using radare2 information☆35Oct 10, 2023Updated 2 years ago
- VM demonstration various symlink and hard link attacks against secure boot. See the whitepaper at: https://www.anvilventures.com/blog/def…☆14Aug 11, 2020Updated 5 years ago
- Enumerate Location Services using CoreLocation API on macOS☆18Dec 2, 2021Updated 4 years ago
- Dockerized setup for quick pwning☆23Mar 2, 2021Updated 5 years ago