A tool which perform deauthentication attack on unpaired bluetooth devices.
☆51Aug 30, 2025Updated 6 months ago
Alternatives and similar repositories for BlueStorm
Users that are interested in BlueStorm are comparing it to the libraries listed below
Sorting:
- Explore the realm of Bluetooth Penetration Testing through our comprehensive website. Learn about different techniques, tools, and best p…☆26Aug 28, 2024Updated last year
- A BLE-controlled USB Rubber Ducky clone built with ESP32-S3 boards.☆22Jan 17, 2026Updated 2 months ago
- A tool that deauthenticates 2.4GHz and 5GHz Wi-Fi networks using BW16.☆19Nov 17, 2025Updated 4 months ago
- Herramienta orientada a pentesting en la zona bluetooth.☆22Jun 26, 2024Updated last year
- A tool which jam classic bluetooth signals.☆77Jan 29, 2026Updated last month
- This repository contains scripts in python from discovering bluetooth to taking over the bluetooth connections.☆173Apr 11, 2024Updated last year
- This is very usefull bluetooth jammer or doser tool in kali or parrot linux...☆166May 12, 2019Updated 6 years ago
- A simple Mac-Address Sniffer based on tshark☆12Dec 27, 2018Updated 7 years ago
- Bluebugger☆31Jun 19, 2025Updated 9 months ago
- The class resources for the v3 deauther☆21Jul 27, 2020Updated 5 years ago
- Simple scripts used to invoke common functionality in Kali Linux and included tools☆11Mar 25, 2020Updated 5 years ago
- BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy [CVE-2020-15802] [CVE-2022-20361]☆19Aug 17, 2022Updated 3 years ago
- SSH Honeypot written in Go☆30Dec 20, 2013Updated 12 years ago
- bootloader files for the Raspberry Pi 3, Pi 4 and Pi Zero 2 W (Pi 5 uses EEPROM)☆31Feb 12, 2026Updated last month
- A simple script that makes possible BLE deauthentication!☆309Sep 29, 2022Updated 3 years ago
- BlueToolkit is an extensible Bluetooth Classic vulnerability testing framework that helps uncover new and old vulnerabilities in Bluetoo…☆667Mar 5, 2026Updated 2 weeks ago
- A tool to uncover hidden SSIDs☆13Apr 17, 2019Updated 6 years ago
- **DarkSec NIGHTBLADE** is an advanced USB Army Knife exploitation framework designed for professional penetration testers and red team op…☆31Nov 6, 2025Updated 4 months ago
- WiFi Hash Purple Monster, store EAPOL & PMKID packets in an SD CARD using a M5STACK / ESP32 device☆12Aug 27, 2022Updated 3 years ago
- Module PMKIDAttack for WiFi Pineapple☆12Oct 6, 2022Updated 3 years ago
- Flipper Zero fap for writing several keys to one T5577☆21Jan 15, 2024Updated 2 years ago
- A WiFi deauthentication tool written in C☆17Sep 20, 2019Updated 6 years ago
- List of Bluetooth BR/EDR/LE security resources☆595Oct 3, 2025Updated 5 months ago
- Script for conducting DOS-attacks on Bluetooth devices for pentest purposes.☆11Jan 27, 2024Updated 2 years ago
- Evil maid attacks are the biggest threat to full disk encryption, if you can't provide 100% physical security. It's not about locking you…☆11Sep 4, 2016Updated 9 years ago
- Serial version of spacehuhn/esp8266_deauther☆24Feb 26, 2017Updated 9 years ago
- mapAccountHijack is a tool designed to carry out a MAP Account hijack attack, which exploits the Message Access Profile (MAP) in Bluetoot…☆70Feb 1, 2025Updated last year
- Windows Stack Based Auto Buffer Overflow Exploiter☆21Feb 19, 2021Updated 5 years ago
- The DCC signal packet inspector. A custom packet analyzer/sniffer for Arduino and ESP32☆20Apr 28, 2025Updated 10 months ago
- Files for the Wi-Fi duck workshop☆12Jan 26, 2020Updated 6 years ago
- Rogue AP using a Raspberry Pi Zero W☆34May 15, 2021Updated 4 years ago
- An 802.11 probe request and beacon sniffer.☆14Mar 16, 2021Updated 5 years ago
- Most powerfull Wifi Jammier.with fixes.☆13Oct 14, 2022Updated 3 years ago
- A tool that collects information from IP address☆30May 30, 2021Updated 4 years ago
- Compilation of HID Scripts and Payloads for P4wnP1☆27Sep 11, 2022Updated 3 years ago
- Software for nRF BLE Sniffer☆23Mar 9, 2017Updated 9 years ago
- Obtain handshakes from networks out of your range!☆27Sep 20, 2021Updated 4 years ago
- Bluetooth dos☆15Mar 8, 2019Updated 7 years ago
- OverburstC2 is a C2 (Command and Control) written in Python and C, designed to manage malware that conducts large-scale DDoS attacks☆28Jan 18, 2026Updated 2 months ago