A Node.js package for BLE (Bluetooth Low Energy) security assessment using Man-in-the-Middle and other attacks
☆815Jan 31, 2022Updated 4 years ago
Alternatives and similar repositories for gattacker
Users that are interested in gattacker are comparing it to the libraries listed below
Sorting:
- BtleJuice Bluetooth Smart (LE) Man-in-the-Middle framework☆833Oct 3, 2018Updated 7 years ago
- Crack and decrypt BLE encryption☆949Aug 26, 2021Updated 4 years ago
- A sniffer for Bluetooth 5 and 4.x LE☆1,101Sep 25, 2025Updated 5 months ago
- Proof of Concept of Sweyntooth Bluetooth Low Energy (BLE) vulnerabilities.☆324Nov 23, 2021Updated 4 years ago
- BLE-Replay is a Bluetooth Low Energy (BLE) peripheral assessment tool☆146Aug 25, 2016Updated 9 years ago
- Bluetooth Low Energy Swiss-army knife☆2,079Aug 4, 2024Updated last year
- Man in the Middle analysis tool for Bluetooth.☆536Feb 24, 2020Updated 6 years ago
- This repository is DEPRECATED, please use bettercap as this tool has been ported to its BLE modules.☆1,092Feb 19, 2019Updated 7 years ago
- BLESuite is a Python package that provides an easier way to test Bluetooth Low Energy (BLE) device☆190Oct 9, 2020Updated 5 years ago
- ☆124Oct 1, 2016Updated 9 years ago
- Key Negotiation Of Bluetooth (KNOB) attacks on Bluetooth BR/EDR and BLE [CVE-2019-9506]☆187Apr 4, 2022Updated 3 years ago
- Bluetooth Low Energy (BLE) packet sniffer and transmitter for both standard and non standard (raw bit) based on Software Defined Radio (S…☆874Updated this week
- Software, firmware, and hardware designs for Ubertooth☆2,084Updated this week
- Bluetooth experimentation framework for Broadcom and Cypress chips.☆767Aug 21, 2024Updated last year
- BLESuite_CLI is a command line tool to enable an easier way to test Bluetooth Low Energy (BLE) devices☆34Aug 1, 2016Updated 9 years ago
- A WebSocket C2 Tool☆413Nov 24, 2017Updated 8 years ago
- PoC scripts demonstrating the BlueBorne vulnerabilities☆611May 17, 2021Updated 4 years ago
- BLEBoy is a training tool to teach users about BLE security by providing a single BLE peripheral that can be used to experiment with each…☆46Oct 25, 2019Updated 6 years ago
- Mirage is a powerful and modular framework dedicated to the security analysis of wireless communications.☆310Apr 13, 2025Updated 11 months ago
- IEEE 802.15.4/ZigBee Security Research Toolkit☆835Sep 12, 2023Updated 2 years ago
- List of Bluetooth BR/EDR/LE security resources☆597Oct 3, 2025Updated 5 months ago
- The iOS Security Testing Framework☆1,383Oct 25, 2020Updated 5 years ago
- Penetration testing framework for ZigBee security research.☆119Dec 22, 2017Updated 8 years ago
- A Bluetooth low energy capture the flag☆747Mar 14, 2026Updated last week
- A graphical security analysis tool for IoT networks☆200Apr 17, 2019Updated 6 years ago
- Clone and moddifications from http://www.secuobs.com/news/15022006-bss_0_8.shtml☆23Nov 5, 2015Updated 10 years ago
- Umap2 is the second revision of NCC Group's python based USB host security assessment tool.☆272Sep 30, 2021Updated 4 years ago
- An intelligence gathering tool for hacking Bluetooth☆990Apr 23, 2023Updated 2 years ago
- tumbleRF: a unified fuzzing framework for low-level RF and HW protocol/PHY/MAC analysis☆164Mar 15, 2018Updated 8 years ago
- A Series of Baseband & LMP Exploits against Bluetooth Classic Controllers☆549Aug 31, 2024Updated last year
- DBC2 (DropboxC2) is a modular post-exploitation tool, composed of an agent running on the victim's machine, a controler, running on any m…☆307Oct 27, 2017Updated 8 years ago
- ☆18Aug 5, 2020Updated 5 years ago
- HomePwn - Swiss Army Knife for Pentesting of IoT Devices☆927Dec 27, 2022Updated 3 years ago
- ✨ Purpose only! The dangers of Bluetooth Low Energy(BLE)implementations: Unveiling zero day vulnerabilities and security flaws in modern …☆344May 27, 2024Updated last year
- This is a PowerShell based tool that is designed to act like a RAT. Its interface is that of a shell where any command that is supported …☆843Jun 25, 2024Updated last year
- ☆106Feb 2, 2016Updated 10 years ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,470Sep 22, 2024Updated last year
- Attify OS - Distro for pentesting IoT devices☆1,020Aug 26, 2021Updated 4 years ago
- WiFi HID Injector - An USB Rubberducky / BadUSB On Steroids.