ruundii / bluez
Bluez fork with an input device profile functionality
☆7Updated last year
Alternatives and similar repositories for bluez:
Users that are interested in bluez are comparing it to the libraries listed below
- konboot iso and Sticky key backddoor.☆24Updated 5 years ago
- Hacking the iPhone Baseband because we paid for it.☆110Updated 6 years ago
- Bluetooth HID hub☆321Updated 2 months ago
- A repository documenting Access control readers and technology☆11Updated 3 years ago
- Wiegand data logger, replay device and micro door-controller☆13Updated last year
- A USB proxy based on raw-gadget and libusb☆184Updated 7 months ago
- Raspberry Pi 4 USB Forwarder, Sniffer, Injector☆62Updated 2 years ago
- Wireshark dissector for Broadcom specific H4 diagnostic commands☆23Updated 2 years ago
- iPhone 15 compatible firmware for the central scrutinizer.☆46Updated last year
- Hello everyone, I am posting the malware injection poc video that I detected on 7-zip, just like in WinRAR. It's your choice to believe o…☆9Updated 2 years ago
- Raw BLE advertisement + sniffing tool (Linux)☆13Updated last year
- An extremely hacky VNC server for WebOS - Works by reading directly from the GPU's framebuffer.☆34Updated 3 years ago
- Linux tool for sniffing smartcard communication between card and reader using season interface.☆40Updated 7 months ago
- BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy [CVE-2020-15802] [CVE-2022-20361]☆19Updated 2 years ago
- Reverse engineering the commonly used 3utools software to make it more open and learn about it.☆25Updated 5 years ago
- Extracting Apple ID Validation Record, Certificate, and Key for AirDrop☆107Updated last year
- ☆6Updated 2 years ago
- Exploits of different CVE IDs (CVE-2021-37910, CVE-2021-40288, CVE-2021-41435, CVE-2021-41436, CVE-2021-41437, CVE-2021-41441, CVE-2021-4…☆17Updated 2 years ago
- Inspecting the Moto Audio application running on Motorola Android devices☆10Updated 3 years ago
- Exploiting Software-Defined Radio - Common attacks and a device to exploit them (Proof of Concept).☆17Updated 4 years ago
- A Javascript-based tool to generate and validate IMEI numbers for Rabbit R1 devices.☆16Updated 8 months ago
- Quickly and easily create a Chroot environment in which to run containerized Kali tools, without screwing up your libraries on your host …☆10Updated last year
- A VS Code Extension to import USB Rubber Ducky keystroke injection payloads quickly!☆11Updated last year
- Apple Silicon to Apple Silicon VDM utility☆49Updated last year
- The scripts in here allows one to passthrough a usb controller consequently an iphone to a VM created through Docker OSX, this should wor…☆63Updated last year
- A collection of hacks and one-off scripts☆10Updated 4 years ago
- macOS/OSX hash dump script taken from Empire framework☆13Updated 6 years ago
- Automatically-compiled list of my GitHub stars☆35Updated 4 months ago
- BurpDroid is a web application debugging tool for Android and is often used for checking web application security. It’s a proxy-based too…☆10Updated 3 years ago
- Zombie Content management systems exploitation Bot Source☆10Updated 3 years ago