merculite / BLE-Security
☆120Updated 8 years ago
Alternatives and similar repositories for BLE-Security:
Users that are interested in BLE-Security are comparing it to the libraries listed below
- tumbleRF: a unified fuzzing framework for low-level RF and HW protocol/PHY/MAC analysis☆158Updated 7 years ago
- ☆106Updated 9 years ago
- A few ZigBee Tools to compliment KillerBee☆52Updated 8 years ago
- The USB host security assessment tool☆276Updated 6 years ago
- Hackable Bluetooth stack in Python☆102Updated 5 years ago
- Attify Badge GUI tool to interact over UART, SPI, JTAG, GPIO etc.☆69Updated 4 years ago
- Penetration testing framework for ZigBee security research.☆112Updated 7 years ago
- PoC tool to demonstrate vulnerabilities in wireless input devices☆86Updated 7 years ago
- Sensor software☆66Updated 3 years ago
- Car Backdoor Maker☆217Updated 6 years ago
- Python libraries for Ubertooth☆53Updated 2 years ago
- Guides and scripts for vehicle cybersecurity research☆50Updated 5 years ago
- NCC Group Open Source RF Security Testing Methodology☆91Updated 2 years ago
- A GUI-based USB device fuzzer☆62Updated 7 years ago
- !!! Deprecated, see www.rfid-tool.com instead !!! The ESP-RFID-Thief is a port of the Tastic RFID Thief to the ESP12S chip with the addit…☆86Updated 7 years ago
- Porting the Pineapple to the Raspberry Pi☆83Updated 11 years ago
- BLE-Replay is a Bluetooth Low Energy (BLE) peripheral assessment tool☆131Updated 8 years ago
- GSM Assessment Toolkit - A security evaluation framework for GSM networks☆73Updated 7 years ago
- BLEBoy is a training tool to teach users about BLE security by providing a single BLE peripheral that can be used to experiment with each…☆41Updated 5 years ago
- Btlejack firmware for BBC Micro:Bit☆51Updated 4 years ago
- Purposely Vulnerable Embedded Device☆22Updated 7 years ago
- KeySniffer device discovery tools and public advisories☆117Updated 8 years ago
- An automated NFC fuzzing framework for Android devices.☆139Updated 4 years ago
- scripts and examples for using JTAG debug tools to gain root access☆176Updated 9 years ago
- Umap2 is the second revision of NCC Group's python based USB host security assessment tool.☆257Updated 3 years ago
- Bluetooth scanner for local devices that may be vulnerable to Blueborne exploit☆152Updated 7 years ago
- EVILSPLOIT – A UNIVERSAL HARDWARE HACKING TOOLKIT☆86Updated 6 years ago
- A simple ISO7816 analyzer that only requires the data-stream.☆60Updated 6 years ago
- Wireless USB Rubber Ducky triggered via BLE (make your Ubertooth quack!)☆111Updated 6 years ago
- scapy-radio (from original Hg repo)☆86Updated 2 years ago