sgxgsx / BlueToolkit
BlueToolkit is an extensible Bluetooth Classic vulnerability testing framework that helps uncover new and old vulnerabilities in Bluetooth-enabled devices. Could be used in the vulnerability research, penetration testing and bluetooth hacking. We also collected and classified Bluetooth vulnerabilities in an "Awesome Bluetooth Security" way
☆387Updated last week
Alternatives and similar repositories for BlueToolkit:
Users that are interested in BlueToolkit are comparing it to the libraries listed below
- Bluetooth Security Assessment Methodology☆112Updated 8 months ago
- Wi-Fi Framework for creating proof-of-concepts, automated experiments, test suites, fuzzers, and more.☆229Updated last year
- Work in progress...☆474Updated 4 months ago
- Hardware/IOT Pentesting Wiki☆560Updated 2 months ago
- Red Team Toolkit - A curated list of tools that are commonly used in the field for Physical Security, Red Teaming, and Tactical Covert En…☆493Updated 8 months ago
- List of Bluetooth BR/EDR/LE security resources☆533Updated last year
- A full-featured open-source Wi-Fi fuzzer☆181Updated 2 weeks ago
- A tool to crack WPA2 passphrase with PMKID value without clients or de-authentication☆191Updated last year
- My personal pretesting recon/low hanging fruit script. Uses Gxss, Dalfox, and a few other scripts to scan all of a domain(and/or subdomai…☆20Updated 2 months ago
- This repository contain a CheatSheet for OSWP & WiFi Cracking.☆311Updated 2 years ago
- Wireless Hacking Devices Protocol client☆146Updated last week
- Hack-A-Sat Qualifiers Writeups☆246Updated 2 years ago
- WiFi Penetration Testing & Auditing Tool☆459Updated 3 weeks ago
- exploits for CVE-2024-20017☆137Updated 5 months ago
- PoC to record audio from a Bluetooth device☆976Updated 10 months ago
- ☆669Updated 7 months ago
- Massive Mobile Security Framework☆272Updated this week
- Evil Crow Cable Pro device☆98Updated last month
- Damn Vulnerable Drone is an intentionally vulnerable drone hacking simulator based on the popular ArduPilot/MAVLink architecture, providi…☆154Updated 5 months ago
- All Linux privilege Escalation methods are listed under one MarkDown🦁 i.e Kernel Exploits to Cronjobs☆37Updated 2 years ago
- Hardware Hacking Cheatsheet infograph☆147Updated 11 months ago
- The IoT security toolkit to help identify IoT related dashboards and scan them for default passwords and vulnerabilities.☆170Updated 2 months ago
- A monster cheatsheet on MITM attacks☆324Updated last year
- ☆529Updated 10 months ago
- Moxie scans & tests MQTT services. Secure your IoT infrastructure!☆36Updated 8 months ago
- 🚀 A swifty RF toolbox baked for your needs, and it's multi-platform! 🌐✨ Available right now in for amd64 Linux & Windows, and with some…☆166Updated last week
- ☆123Updated last year
- Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.☆557Updated 3 months ago
- A revamped and updated version of my original OneRuleToRuleThemAll hashcat rule☆433Updated 4 months ago
- Here are the most interesting Shodan dorks (according to me)☆75Updated last year