A Node.js package for BLE (Bluetooth Low Energy) security assessment using Man-in-the-Middle and other attacks
☆822Jan 31, 2022Updated 4 years ago
Alternatives and similar repositories for gattacker
Users that are interested in gattacker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- BtleJuice Bluetooth Smart (LE) Man-in-the-Middle framework☆835Oct 3, 2018Updated 7 years ago
- Crack and decrypt BLE encryption☆956Aug 26, 2021Updated 4 years ago
- A sniffer for Bluetooth 5 and 4.x LE☆1,110Sep 25, 2025Updated 7 months ago
- Proof of Concept of Sweyntooth Bluetooth Low Energy (BLE) vulnerabilities.☆327Nov 23, 2021Updated 4 years ago
- BLE-Replay is a Bluetooth Low Energy (BLE) peripheral assessment tool☆148Aug 25, 2016Updated 9 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Bluetooth Low Energy Swiss-army knife☆2,086Aug 4, 2024Updated last year
- Man in the Middle analysis tool for Bluetooth.☆537Feb 24, 2020Updated 6 years ago
- This repository is DEPRECATED, please use bettercap as this tool has been ported to its BLE modules.☆1,095Feb 19, 2019Updated 7 years ago
- BLESuite is a Python package that provides an easier way to test Bluetooth Low Energy (BLE) device☆189Oct 9, 2020Updated 5 years ago
- Key Negotiation Of Bluetooth (KNOB) attacks on Bluetooth BR/EDR and BLE [CVE-2019-9506]☆187Apr 4, 2022Updated 4 years ago
- ☆124Oct 1, 2016Updated 9 years ago
- Bluetooth Low Energy (BLE) packet sniffer and transmitter for both standard and non standard (raw bit) based on Software Defined Radio (S…☆883Apr 18, 2026Updated last week
- Software, firmware, and hardware designs for Ubertooth☆2,086Mar 19, 2026Updated last month
- Bluetooth experimentation framework for Broadcom and Cypress chips.☆771Aug 21, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- BLESuite_CLI is a command line tool to enable an easier way to test Bluetooth Low Energy (BLE) devices☆34Aug 1, 2016Updated 9 years ago
- A WebSocket C2 Tool☆416Nov 24, 2017Updated 8 years ago
- PoC scripts demonstrating the BlueBorne vulnerabilities☆611May 17, 2021Updated 4 years ago
- BLEBoy is a training tool to teach users about BLE security by providing a single BLE peripheral that can be used to experiment with each…☆47Oct 25, 2019Updated 6 years ago
- Mirage is a powerful and modular framework dedicated to the security analysis of wireless communications.☆312Apr 13, 2025Updated last year
- IEEE 802.15.4/ZigBee Security Research Toolkit☆839Sep 12, 2023Updated 2 years ago
- List of Bluetooth BR/EDR/LE security resources☆602Oct 3, 2025Updated 6 months ago
- The iOS Security Testing Framework☆1,386Oct 25, 2020Updated 5 years ago
- A Bluetooth low energy capture the flag☆755Mar 26, 2026Updated last month
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Penetration testing framework for ZigBee security research.☆121Dec 22, 2017Updated 8 years ago
- A graphical security analysis tool for IoT networks☆200Apr 17, 2019Updated 7 years ago
- Clone and moddifications from http://www.secuobs.com/news/15022006-bss_0_8.shtml☆23Nov 5, 2015Updated 10 years ago
- Umap2 is the second revision of NCC Group's python based USB host security assessment tool.☆274Sep 30, 2021Updated 4 years ago
- An intelligence gathering tool for hacking Bluetooth☆997Apr 23, 2023Updated 3 years ago
- tumbleRF: a unified fuzzing framework for low-level RF and HW protocol/PHY/MAC analysis☆164Mar 15, 2018Updated 8 years ago
- A Series of Baseband & LMP Exploits against Bluetooth Classic Controllers☆558Aug 31, 2024Updated last year
- DBC2 (DropboxC2) is a modular post-exploitation tool, composed of an agent running on the victim's machine, a controler, running on any m…☆310Oct 27, 2017Updated 8 years ago
- ☆18Aug 5, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- HomePwn - Swiss Army Knife for Pentesting of IoT Devices☆931Dec 27, 2022Updated 3 years ago
- ✨ Purpose only! The dangers of Bluetooth Low Energy(BLE)implementations: Unveiling zero day vulnerabilities and security flaws in modern …☆346May 27, 2024Updated last year
- This is a PowerShell based tool that is designed to act like a RAT. Its interface is that of a shell where any command that is supported …☆847Jun 25, 2024Updated last year
- ☆106Feb 2, 2016Updated 10 years ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,481Sep 22, 2024Updated last year
- Attify OS - Distro for pentesting IoT devices☆1,025Aug 26, 2021Updated 4 years ago
- The Damn Vulnerable Router Firmware Project☆714Apr 7, 2021Updated 5 years ago