merculite / BLE-SecurityLinks
☆120Updated 8 years ago
Alternatives and similar repositories for BLE-Security
Users that are interested in BLE-Security are comparing it to the libraries listed below
Sorting:
- ☆106Updated 9 years ago
- A few ZigBee Tools to compliment KillerBee☆53Updated 8 years ago
- The USB host security assessment tool☆280Updated 6 years ago
- tumbleRF: a unified fuzzing framework for low-level RF and HW protocol/PHY/MAC analysis☆160Updated 7 years ago
- Def Con 2017 Car Hacking Village Badge☆43Updated 5 years ago
- Penetration testing framework for ZigBee security research.☆115Updated 7 years ago
- KeySniffer device discovery tools and public advisories☆118Updated 8 years ago
- Sensor software☆68Updated 3 years ago
- Attify Badge GUI tool to interact over UART, SPI, JTAG, GPIO etc.☆69Updated 4 years ago
- Car Backdoor Maker☆219Updated 6 years ago
- a 802.11 wireless fuzzer☆92Updated 12 years ago
- An automated NFC fuzzing framework for Android devices.☆142Updated 4 years ago
- A GUI-based USB device fuzzer☆64Updated 7 years ago
- scripts and examples for using JTAG debug tools to gain root access☆178Updated 9 years ago
- Hackable Bluetooth stack in Python☆102Updated 5 years ago
- !!! Deprecated, see www.rfid-tool.com instead !!! The ESP-RFID-Thief is a port of the Tastic RFID Thief to the ESP12S chip with the addit…☆87Updated 7 years ago
- BLE-Replay is a Bluetooth Low Energy (BLE) peripheral assessment tool☆135Updated 8 years ago
- GSM Assessment Toolkit - A security evaluation framework for GSM networks☆74Updated 7 years ago
- HARDSPLOIT GUI : The essential security auditing tool for Internet of Things devices you'll need in your toolbox☆39Updated 5 years ago
- PoC tool to demonstrate vulnerabilities in wireless input devices☆86Updated 8 years ago
- Bluetooth Impersonation AttackS (BIAS) [CVE 2020-10135]☆92Updated 3 years ago
- Modified proxmark3 firmware to perform brute forcing of 26-Bit ProxCards☆62Updated 8 years ago
- Universal Plug and Fuzz☆42Updated 5 years ago
- Python plugin for Kismet to perform deauthentication to collect WPA2 handshakes☆96Updated 8 years ago
- Purposely Vulnerable Embedded Device☆22Updated 7 years ago
- scapy-radio (from original Hg repo)☆86Updated 2 years ago
- Porting the Pineapple to the Raspberry Pi☆84Updated 11 years ago
- NCC Group Open Source RF Security Testing Methodology☆91Updated 3 years ago
- TROMMEL: Sift Through Embedded Device Files to Identify Potential Vulnerable Indicators☆208Updated 4 years ago
- X41 Smartcard Fuzzer☆117Updated 6 years ago