ttdennis / bluetooth_smp_pocsLinks
BLE Passkey Bruteforce PoC
☆31Updated 3 weeks ago
Alternatives and similar repositories for bluetooth_smp_pocs
Users that are interested in bluetooth_smp_pocs are comparing it to the libraries listed below
Sorting:
- BLE-Replay is a Bluetooth Low Energy (BLE) peripheral assessment tool☆141Updated 9 years ago
- Bluetooth Impersonation AttackS (BIAS) [CVE 2020-10135]☆92Updated 4 years ago
- Bluetooth Low Energy hardware-less HackMe☆104Updated 4 years ago
- BlueRepli-Plus☆18Updated 5 years ago
- BLEBoy is a training tool to teach users about BLE security by providing a single BLE peripheral that can be used to experiment with each…☆43Updated 5 years ago
- Key Negotiation Of Bluetooth (KNOB) attacks on Bluetooth BR/EDR and BLE [CVE-2019-9506]☆186Updated 3 years ago
- Wireshark dissector for Broadcom specific H4 diagnostic commands☆23Updated 2 years ago
- USB testing made easy☆117Updated 2 years ago
- ☆17Updated 7 years ago
- CVE-2017-0785 BlueBorne PoC☆40Updated 8 years ago
- nOBEX allows emulating the PBAP, MAP, and HFP profiles to test vehicle infotainment systems and similar devices using these profiles☆91Updated 4 years ago
- Clone and moddifications from http://www.secuobs.com/news/15022006-bss_0_8.shtml☆23Updated 9 years ago
- PoC exploit for arbitrary file read/write in locked Samsung Android device via MTP (SVE-2017-10086)☆169Updated 7 years ago
- "Opening Pandora's Box through ATFuzzer: Dynamic Analysis of AT Interface for Android Smartphones" ACSAC 2019☆157Updated 4 years ago
- A fuzzer for APDU-based smartcard interfaces☆20Updated 6 months ago
- Tool for discovering and de-anonymizing Classic Bluetooth connections☆52Updated 5 years ago
- BlueMaho is GUI-shell (interface) for suite of tools for testing security of bluetooth devices. It is freeware, opensource, written on py…☆61Updated 9 years ago
- PoC Exploiting Permission Bypass in Android's Download Provider (CVE-2018-9468)☆20Updated 5 years ago
- Host Card Emulation. Based on Cyanogenmod 9 Android. Design goal is relay DesFire card communication (Widely used in transportation syste…☆27Updated 11 years ago
- Content related to hardware hacking☆53Updated 6 years ago
- Smartcard APDU interception and MITM for one smartcard model☆39Updated 7 years ago
- LoRaWAN session cracker - A PoC for exploiting weak or shared Application Keys☆17Updated 3 years ago
- Code for the AsiaCCS 2017 paper "Discovering Logical Vulnerabilities in the Wi-Fi Handshake using Model-Based Testing".☆13Updated 6 years ago
- Tools for exploiting, reverse engineering, and deploying firmware to the S3FWRN5 and S3NRN82 Samsung NFC Controllers☆100Updated 5 years ago
- A tool that bypasses PN553 signature protection☆50Updated 2 years ago
- Proof of Concept of Sweyntooth Bluetooth Low Energy (BLE) vulnerabilities.☆312Updated 3 years ago
- Code Samples for the book "The Definite Guide to ARM Exploitation"☆52Updated 7 years ago
- ☆243Updated 4 years ago
- Universal BLE Monitoring with Frida (or Objection)☆104Updated last year
- Patches the popular rooting framework SuperSU to evade common root detections. This is done by renaming binaries / references to break si…☆45Updated 4 years ago