Advanced: Bluetooth low energy capture the flag
☆65Aug 4, 2023Updated 2 years ago
Alternatives and similar repositories for ble_ctf_infinity
Users that are interested in ble_ctf_infinity are comparing it to the libraries listed below
Sorting:
- A Bluetooth low energy capture the flag☆746Aug 11, 2025Updated 6 months ago
- OWASP Embedded Application Security Project☆18Jan 17, 2022Updated 4 years ago
- This will be a wiki when it grows up, if it grows up☆95Aug 11, 2025Updated 6 months ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Aug 16, 2022Updated 3 years ago
- I have taken all of the challenges from Protostar - https://exploit-exercises.com/protostar/- and compiled them for the ARM architecture.…☆25Apr 7, 2015Updated 10 years ago
- A list of resources for those interested in hardware, embedded, and IoT security☆75Oct 6, 2024Updated last year
- ☆10Apr 11, 2023Updated 2 years ago
- Generate WWVB timecodes for any desired time☆10Sep 8, 2025Updated 5 months ago
- CTF Writeup for Car Hacking Village, DEF CON 30 (2022)☆12Aug 16, 2022Updated 3 years ago
- Script used to track airtags (using Apple's Find My-network through the Find My-app on macOS) and save the location history data to CSV f…☆13Nov 19, 2024Updated last year
- ☆14Sep 2, 2020Updated 5 years ago
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 8 years ago
- HTML smuggling is not an evil, it can be useful☆14Jan 28, 2023Updated 3 years ago
- An amateur radio fox transmitter for fox hunting☆19Nov 24, 2025Updated 3 months ago
- Spins up a docker container with several useful tools for offensive security in macOS/cloud environments. Also installs the needed depend…☆18Nov 3, 2021Updated 4 years ago
- A Post-exploitation Toolset for Interacting with the Microsoft Graph API☆15Nov 16, 2023Updated 2 years ago
- DHCP fingerprints database and related tools☆19Nov 14, 2014Updated 11 years ago
- ☆23Jun 22, 2024Updated last year
- DVRPi is a RaspberryPi 4B firmware designed to teach hardware hacking through intentional vulnerabilities.☆42Nov 3, 2025Updated 3 months ago
- IoTGoat is a deliberately insecure firmware created to educate software developers and security professionals with testing commonly foun…☆867Oct 5, 2025Updated 4 months ago
- ☆25Jun 5, 2023Updated 2 years ago
- GitLab Attack TOolkit☆34Oct 8, 2025Updated 4 months ago
- Low-cost WarShipping with built-in geofencing, WiFi recon, and Rogue AP on the ESP8266☆46Sep 16, 2022Updated 3 years ago
- ☆20Aug 11, 2024Updated last year
- ☆22Oct 24, 2016Updated 9 years ago
- OWASP Threat Dragon with Gitlab Integration☆27Nov 6, 2017Updated 8 years ago
- ☆70Jul 24, 2025Updated 7 months ago
- understanding the tinyfpga bootloader☆25Apr 22, 2018Updated 7 years ago
- ☆22May 22, 2020Updated 5 years ago
- AutoRMM is a collection of scripts and instructions we are organizing, to test delivery mechanisms for RMM and screen sharing tools, alo…☆92Aug 3, 2025Updated 6 months ago
- Damn Vulnerable IoT Device☆216Feb 12, 2024Updated 2 years ago
- Efflanrs - GUI for Snaffler Output☆26Sep 13, 2024Updated last year
- Citrix Phishlet☆24Feb 2, 2021Updated 5 years ago
- Simple chrome extension for full name extraction and conversion to emails/usernames. Utilizes the 'people' tab of the target company on L…☆28Apr 30, 2025Updated 10 months ago
- Mattermost - Shodan Slash command☆31Jan 25, 2017Updated 9 years ago
- Binaryninja AVR architecture plugin with lifting☆45Oct 26, 2023Updated 2 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Aug 19, 2018Updated 7 years ago
- r2yara - Module for Yara using radare2 information☆35Oct 10, 2023Updated 2 years ago
- A broken-by-design Azure environment to practice and train security skills in the cloud domain.☆27Oct 20, 2025Updated 4 months ago