hexway / apple_bleeeLinks
Apple BLE research
☆2,162Updated 2 years ago
Alternatives and similar repositories for apple_bleee
Users that are interested in apple_bleee are comparing it to the libraries listed below
Sorting:
- Bluetooth Low Energy Swiss-army knife☆2,041Updated last year
- An open source implementation of Apple's Wi-Fi Password Sharing protocol in Python.☆830Updated 4 years ago
- Like nmap for mapping wifi networks you're not connected to, plus device tracking☆2,691Updated last year
- Upload arbitrary data via Apple's Find My network.☆1,860Updated last year
- A sniffer for Bluetooth 5 and 4.x LE☆1,032Updated last month
- This repository is DEPRECATED, please use bettercap as this tool has been ported to its BLE modules.☆1,092Updated 6 years ago
- Build interactive map of cameras from Shodan☆1,266Updated 5 years ago
- Get unencrypted 'Saved Password' from Google Chrome☆735Updated 2 years ago
- The best hacker's gadgets for Red Team pentesters and security researchers.☆2,145Updated 5 years ago
- Tracking history of USB events on GNU/Linux☆1,169Updated 3 years ago
- A Node.js package for BLE (Bluetooth Low Energy) security assessment using Man-in-the-Middle and other attacks☆788Updated 3 years ago
- Proof of Concept of ESP32/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588)☆811Updated 6 years ago
- Keylogger for mac written in Swift using HID☆1,150Updated 7 years ago
- An evil RAT (Remote Administration Tool) for macOS / OS X.☆2,378Updated 4 years ago
- BtleJuice Bluetooth Smart (LE) Man-in-the-Middle framework☆820Updated 7 years ago
- Capture handshakes of nearby WiFi networks automatically☆771Updated 4 years ago
- P4wnP1 is a highly customizable USB attack platform, based on a low cost Raspberry Pi Zero or Raspberry Pi Zero W.☆4,280Updated last year
- A stealth AirTag clone that bypasses all of Apple's tracking protection features☆1,204Updated 3 years ago
- Bluetooth experimentation framework for Broadcom and Cypress chips.☆744Updated last year
- Software, firmware, and hardware designs for Ubertooth☆2,051Updated last year
- iOS/macOS/Linux Remote Administration Tool☆1,726Updated 4 years ago
- A portable device that can spoof/emulate any magnetic stripe, credit card or hotel card "wirelessly", even on standard magstripe (non-NFC…☆4,066Updated 3 years ago
- A manager for your secrets.☆952Updated last year
- P4wnP1 A.L.O.A. by MaMe82 is a framework which turns a Rapsberry Pi Zero W into a flexible, low-cost platform for pentesting, red teaming…☆4,177Updated 2 years ago
- Crack and decrypt BLE encryption☆934Updated 4 years ago
- Mac OS X Keychain Forensic Tool☆895Updated 2 years ago
- NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewa…☆1,949Updated 2 years ago
- JackIt - Exploit Code for Mousejack☆868Updated 5 years ago
- A collection of all the data i could extract from 1 billion leaked credentials from internet.☆3,199Updated 5 years ago
- macOS keychain cracking tool☆873Updated 3 years ago