sgxgsx / BlueToolkit
BlueToolkit is an extensible Bluetooth Classic vulnerability testing framework that helps uncover new and old vulnerabilities in Bluetooth-enabled devices. Could be used in the vulnerability research, penetration testing and bluetooth hacking. We also collected and classified Bluetooth vulnerabilities in an "Awesome Bluetooth Security" way
☆398Updated 3 weeks ago
Alternatives and similar repositories for BlueToolkit:
Users that are interested in BlueToolkit are comparing it to the libraries listed below
- Bluetooth Security Assessment Methodology☆124Updated 9 months ago
- A tool to crack WPA2 passphrase with PMKID value without clients or de-authentication☆210Updated last year
- ☆680Updated 8 months ago
- Wi-Fi Framework for creating proof-of-concepts, automated experiments, test suites, fuzzers, and more.☆233Updated last year
- List of Bluetooth BR/EDR/LE security resources☆539Updated last year
- Wireless Hacking Devices Protocol client☆153Updated this week
- ☆531Updated 11 months ago
- The IoT security toolkit to help identify IoT related dashboards and scan them for default passwords and vulnerabilities.☆177Updated 3 months ago
- exploits for CVE-2024-20017☆137Updated 6 months ago
- QuadraInspect is an Android framework that integrates AndroPass, APKUtil, and MobFS, providing a powerful tool for analyzing the security…☆340Updated 8 months ago
- This repository contain a CheatSheet for OSWP & WiFi Cracking.☆312Updated 2 years ago
- Evil Crow Cable Pro device☆102Updated 2 months ago
- WiFi Penetration Testing & Auditing Tool☆482Updated last month
- Hardware Hacking Cheatsheet infograph☆149Updated last year
- A full-featured open-source Wi-Fi fuzzer☆185Updated last week
- Apple BLE proximity pairing message spoofing☆19Updated last year
- PETEP (PEnetration TEsting Proxy) is an open-source Java application for traffic analysis & modification using TCP/UDP proxies. PETEP is …☆195Updated last year
- Red Team Toolkit - A curated list of tools that are commonly used in the field for Physical Security, Red Teaming, and Tactical Covert En…☆497Updated 9 months ago
- This Python script checks for the CVE-2024-6387 vulnerability in OpenSSH servers. It supports multiple IP addresses, URLs, CIDR ranges, a…☆96Updated 8 months ago
- Full Build Guide for making your own RFID Gooseneck Long Range Reader!☆45Updated 7 months ago
- Shodan Dorks☆325Updated last month
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆356Updated last year
- quick and dirty canbus h4xing framework☆134Updated 5 months ago
- A monster cheatsheet on MITM attacks☆342Updated last year
- Script with several tools to brute force garages, hack radio stations and capture and analyze radio signals with Raspberry Pi☆176Updated 5 months ago
- Unlock Exclusive Insights! 🚀📖 Download My FREE E-Zine Now ➡️ Over 170 Pages of Essential Content! Elevate your hardware hacking game w…☆199Updated 7 months ago
- Damn Vulnerable Drone is an intentionally vulnerable drone hacking simulator based on the popular ArduPilot/MAVLink architecture, providi…☆187Updated 6 months ago
- OSINT tool to crawl a site and extract useful recon info.☆273Updated 3 months ago
- Work in progress...☆478Updated 6 months ago
- Hack-A-Sat Qualifiers Writeups☆250Updated 2 years ago