BlueToolkit is an extensible Bluetooth Classic vulnerability testing framework that helps uncover new and old vulnerabilities in Bluetooth-enabled devices. Could be used in the vulnerability research, penetration testing and bluetooth hacking. We also collected and classified Bluetooth vulnerabilities in an "Awesome Bluetooth Security" way
☆657Aug 29, 2025Updated 6 months ago
Alternatives and similar repositories for BlueToolkit
Users that are interested in BlueToolkit are comparing it to the libraries listed below
Sorting:
- mapAccountHijack is a tool designed to carry out a MAP Account hijack attack, which exploits the Message Access Profile (MAP) in Bluetoot…☆69Feb 1, 2025Updated last year
- Directory with Bluetooth exploits that is used in BlueToolkit☆21Sep 30, 2025Updated 5 months ago
- Bluekit is an extensible engine, CLI tool used in BlueToolkit☆17Sep 25, 2025Updated 5 months ago
- PoC to record audio from a Bluetooth device☆1,566Apr 4, 2024Updated last year
- ☆65Apr 28, 2024Updated last year
- Bluetooth Security Assessment Methodology☆149Jan 8, 2026Updated last month
- 🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard…☆1,781Feb 11, 2026Updated 3 weeks ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Oct 12, 2024Updated last year
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- A Series of Baseband & LMP Exploits against Bluetooth Classic Controllers☆546Aug 31, 2024Updated last year
- ☆727Jun 24, 2024Updated last year
- List of Bluetooth BR/EDR/LE security resources☆592Oct 3, 2025Updated 5 months ago
- PacketSpy☆157May 31, 2024Updated last year
- Subprober is a powerful and efficient subdomain scanning tool written in Python. With the ability to handle large lists of subdomains. Th…☆262Jul 6, 2025Updated 7 months ago
- Wireless Hacking Devices Protocol client☆284Updated this week
- Viber Osint helper tool to save your time through automation and help you find registered users.☆56Sep 17, 2023Updated 2 years ago
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆20Feb 2, 2024Updated 2 years ago
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆28Jul 15, 2024Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Mar 8, 2024Updated last year
- WiFi Penetration Testing & Auditing Tool☆719Apr 28, 2025Updated 10 months ago
- Docker Remote API Scanner and Exploit☆180Nov 13, 2023Updated 2 years ago
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆729Jan 25, 2026Updated last month
- MITM Field Manual☆370Jan 9, 2026Updated last month
- Auto exploitation tool for CVE-2024-24401.☆36Sep 7, 2024Updated last year
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆442Oct 1, 2025Updated 5 months ago
- ☆33Aug 20, 2025Updated 6 months ago
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆60Nov 22, 2024Updated last year
- DockerSpy searches for images on Docker Hub and extracts sensitive information such as authentication secrets, private keys, and more.☆243Jul 31, 2024Updated last year
- Wi-Fi Framework for creating proof-of-concepts, automated experiments, test suites, fuzzers, and more.☆251Apr 18, 2025Updated 10 months ago
- Reverse engineering the TI AM3358 boot ROM☆60Aug 25, 2024Updated last year
- ☆568Mar 28, 2024Updated last year
- An intelligence gathering tool for hacking Bluetooth☆985Apr 23, 2023Updated 2 years ago
- A sniffer for Bluetooth 5 and 4.x LE☆1,092Sep 25, 2025Updated 5 months ago
- ☆13Dec 21, 2023Updated 2 years ago
- MikroTik RouterOS Security Inspector☆304Feb 1, 2026Updated last month
- Bluebugger☆30Jun 19, 2025Updated 8 months ago
- ☆35Dec 6, 2023Updated 2 years ago
- Shodan Dorks☆498Feb 13, 2025Updated last year
- Proof of Concept of Sweyntooth Bluetooth Low Energy (BLE) vulnerabilities.☆323Nov 23, 2021Updated 4 years ago