A Node.js package for BLE (Bluetooth Low Energy) security assessment using Man-in-the-Middle and other attacks
☆808Jan 31, 2022Updated 4 years ago
Alternatives and similar repositories for gattacker
Users that are interested in gattacker are comparing it to the libraries listed below
Sorting:
- BtleJuice Bluetooth Smart (LE) Man-in-the-Middle framework☆829Oct 3, 2018Updated 7 years ago
- Crack and decrypt BLE encryption☆948Aug 26, 2021Updated 4 years ago
- A sniffer for Bluetooth 5 and 4.x LE☆1,092Sep 25, 2025Updated 5 months ago
- This repository is DEPRECATED, please use bettercap as this tool has been ported to its BLE modules.☆1,092Feb 19, 2019Updated 7 years ago
- Proof of Concept of Sweyntooth Bluetooth Low Energy (BLE) vulnerabilities.☆323Nov 23, 2021Updated 4 years ago
- BLE-Replay is a Bluetooth Low Energy (BLE) peripheral assessment tool☆146Aug 25, 2016Updated 9 years ago
- Bluetooth Low Energy Swiss-army knife☆2,077Aug 4, 2024Updated last year
- Man in the Middle analysis tool for Bluetooth.☆536Feb 24, 2020Updated 6 years ago
- BLESuite is a Python package that provides an easier way to test Bluetooth Low Energy (BLE) device☆190Oct 9, 2020Updated 5 years ago
- Bluetooth Low Energy (BLE) packet sniffer and transmitter for both standard and non standard (raw bit) based on Software Defined Radio (S…☆868Feb 11, 2026Updated 2 weeks ago
- PoC scripts demonstrating the BlueBorne vulnerabilities☆610May 17, 2021Updated 4 years ago
- ☆124Oct 1, 2016Updated 9 years ago
- Key Negotiation Of Bluetooth (KNOB) attacks on Bluetooth BR/EDR and BLE [CVE-2019-9506]☆187Apr 4, 2022Updated 3 years ago
- Software, firmware, and hardware designs for Ubertooth☆2,077Jan 25, 2024Updated 2 years ago
- IEEE 802.15.4/ZigBee Security Research Toolkit☆832Sep 12, 2023Updated 2 years ago
- BLESuite_CLI is a command line tool to enable an easier way to test Bluetooth Low Energy (BLE) devices☆34Aug 1, 2016Updated 9 years ago
- Bluetooth experimentation framework for Broadcom and Cypress chips.☆763Aug 21, 2024Updated last year
- A graphical security analysis tool for IoT networks☆200Apr 17, 2019Updated 6 years ago
- A WebSocket C2 Tool☆411Nov 24, 2017Updated 8 years ago
- Mirage is a powerful and modular framework dedicated to the security analysis of wireless communications.☆310Apr 13, 2025Updated 10 months ago
- BLEBoy is a training tool to teach users about BLE security by providing a single BLE peripheral that can be used to experiment with each…☆46Oct 25, 2019Updated 6 years ago
- Umap2 is the second revision of NCC Group's python based USB host security assessment tool.☆272Sep 30, 2021Updated 4 years ago
- The iOS Security Testing Framework☆1,383Oct 25, 2020Updated 5 years ago
- A Bluetooth low energy capture the flag☆746Aug 11, 2025Updated 6 months ago
- List of Bluetooth BR/EDR/LE security resources☆591Oct 3, 2025Updated 4 months ago
- Penetration testing framework for ZigBee security research.☆119Dec 22, 2017Updated 8 years ago
- WiFi HID Injector - An USB Rubberducky / BadUSB On Steroids.☆1,784Jul 27, 2024Updated last year
- An intelligence gathering tool for hacking Bluetooth☆982Apr 23, 2023Updated 2 years ago
- Attify OS - Distro for pentesting IoT devices☆1,019Aug 26, 2021Updated 4 years ago
- A Series of Baseband & LMP Exploits against Bluetooth Classic Controllers☆545Aug 31, 2024Updated last year
- Blueborne CVE-2017-0785 Android information leak vulnerability☆472Sep 23, 2017Updated 8 years ago
- RFSec-ToolKit is a collection of Radio Frequency Communication Protocol Hacktools.无线通信协议相关的工具集,可借助SDR硬件+相关工具对无线通信进行研究。Collect with ♥ by H…☆1,683May 28, 2024Updated last year
- ✨ Purpose only! The dangers of Bluetooth Low Energy(BLE)implementations: Unveiling zero day vulnerabilities and security flaws in modern …☆343May 27, 2024Updated last year
- Nameserver DNS poisoning attacks made easy☆526Feb 26, 2017Updated 9 years ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,465Sep 22, 2024Updated last year
- Clone and moddifications from http://www.secuobs.com/news/15022006-bss_0_8.shtml☆23Nov 5, 2015Updated 10 years ago
- tumbleRF: a unified fuzzing framework for low-level RF and HW protocol/PHY/MAC analysis☆164Mar 15, 2018Updated 7 years ago
- DBC2 (DropboxC2) is a modular post-exploitation tool, composed of an agent running on the victim's machine, a controler, running on any m…☆306Oct 27, 2017Updated 8 years ago
- Enumeration and reconnaissance activities in the Microsoft Azure Cloud.☆254Feb 20, 2019Updated 7 years ago