BlueToolkit is an extensible Bluetooth Classic vulnerability testing framework that helps uncover new and old vulnerabilities in Bluetooth-enabled devices. Could be used in the vulnerability research, penetration testing and bluetooth hacking. We also collected and classified Bluetooth vulnerabilities in an "Awesome Bluetooth Security" way
☆680Mar 5, 2026Updated last month
Alternatives and similar repositories for BlueToolkit
Users that are interested in BlueToolkit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- mapAccountHijack is a tool designed to carry out a MAP Account hijack attack, which exploits the Message Access Profile (MAP) in Bluetoot…☆75Feb 1, 2025Updated last year
- Directory with Bluetooth exploits that is used in BlueToolkit☆22Sep 30, 2025Updated 6 months ago
- Bluekit is an extensible engine, CLI tool used in BlueToolkit☆17Sep 25, 2025Updated 6 months ago
- ☆65Apr 28, 2024Updated last year
- PoC to record audio from a Bluetooth device☆1,577Apr 4, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- 🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard…☆1,817Feb 11, 2026Updated 2 months ago
- A Series of Baseband & LMP Exploits against Bluetooth Classic Controllers☆554Aug 31, 2024Updated last year
- Bluetooth Security Assessment Methodology☆155Mar 31, 2026Updated 2 weeks ago
- Bluebugger☆31Jun 19, 2025Updated 9 months ago
- ☆731Jun 24, 2024Updated last year
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Oct 12, 2024Updated last year
- List of Bluetooth BR/EDR/LE security resources☆600Oct 3, 2025Updated 6 months ago
- Wireless Hacking Devices Protocol client☆292Mar 30, 2026Updated 2 weeks ago
- Viber Osint helper tool to save your time through automation and help you find registered users.☆56Sep 17, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- This repository contains scripts in python from discovering bluetooth to taking over the bluetooth connections.☆175Apr 11, 2024Updated 2 years ago
- ☆34Aug 20, 2025Updated 7 months ago
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- ✨ Purpose only! The dangers of Bluetooth Low Energy(BLE)implementations: Unveiling zero day vulnerabilities and security flaws in modern …☆346May 27, 2024Updated last year
- Subprober is a powerful and efficient subdomain scanning tool written in Python. With the ability to handle large lists of subdomains. Th…☆266Mar 22, 2026Updated 3 weeks ago
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆28Jul 15, 2024Updated last year
- A tool which perform deauthentication attack on unpaired bluetooth devices.☆52Aug 30, 2025Updated 7 months ago
- L2Fuzz Source Code☆44Dec 15, 2023Updated 2 years ago
- PacketSpy☆157May 31, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Mar 8, 2024Updated 2 years ago
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆20Feb 2, 2024Updated 2 years ago
- An intelligence gathering tool for hacking Bluetooth☆995Apr 23, 2023Updated 2 years ago
- MITM Field Manual☆373Jan 9, 2026Updated 3 months ago
- Proof of Concept of Sweyntooth Bluetooth Low Energy (BLE) vulnerabilities.☆326Nov 23, 2021Updated 4 years ago
- Docker Remote API Scanner and Exploit☆180Nov 13, 2023Updated 2 years ago
- A sniffer for Bluetooth 5 and 4.x LE☆1,107Sep 25, 2025Updated 6 months ago
- ☆10Feb 4, 2024Updated 2 years ago
- ☆35Dec 6, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Scripts and Tips for Kali Linux Pi-Tail Edition☆11Dec 8, 2023Updated 2 years ago
- MikroTik RouterOS Security Inspector☆308Feb 1, 2026Updated 2 months ago
- ☆570Mar 28, 2024Updated 2 years ago
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆443Oct 1, 2025Updated 6 months ago
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆746Jan 25, 2026Updated 2 months ago
- CatSniffer is an original multiprotocol and multiband board for sniffing, communicating, and attacking IoT (Internet of Things) devices u…☆830Feb 12, 2026Updated 2 months ago
- Wireshark-compatible all-channel BLE sniffer for bladeRF, with wideband Bluetooth sniffing for HackRF and USRP☆409Nov 23, 2025Updated 4 months ago