BlueMaho is GUI-shell (interface) for suite of tools for testing security of bluetooth devices. It is freeware, opensource, written on python, uses wxPyhon. It can be used for testing BT-devices for known vulnerabilities and major thing to do – testing to find unknown vulns. Also it can form nice statistics.
☆67Jun 28, 2016Updated 9 years ago
Alternatives and similar repositories for bluemaho
Users that are interested in bluemaho are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Tool developed to fuzz the GATT layer of the Bluetooth Low Energy protocol based on defined attack scenarios.☆67Oct 25, 2024Updated last year
- decode Bluetooth Class of Device☆27Feb 17, 2014Updated 12 years ago
- bluesnarfing proof-of-concept tool.☆58Jan 25, 2016Updated 10 years ago
- Sample code for my article Intelligent Steering Using PID Controllers in the book AI Game Programming Wisdom 2☆12Apr 21, 2020Updated 5 years ago
- This script allows us to perform an execution in the memory of the device without leaving traces for forensic analysts after its executio…☆12May 12, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- OpenBTS 5.0 + Testcall☆18Jan 13, 2017Updated 9 years ago
- BLESuite_CLI is a command line tool to enable an easier way to test Bluetooth Low Energy (BLE) devices☆34Aug 1, 2016Updated 9 years ago
- ☆21Aug 29, 2023Updated 2 years ago
- Bluetooth hack, forked from https://gitlab.com/kalilinux/packages/bluesnarfer/☆251Jan 8, 2024Updated 2 years ago
- CookieCatcher☆146Sep 3, 2013Updated 12 years ago
- ☆10Nov 28, 2020Updated 5 years ago
- ☆16Nov 14, 2016Updated 9 years ago
- A Node.js package for BLE (Bluetooth Low Energy) security assessment using Man-in-the-Middle and other attacks☆817Jan 31, 2022Updated 4 years ago
- Pre-built XTRX packages and firmware images☆43Feb 17, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Secure FTP☆11Jul 28, 2018Updated 7 years ago
- Control your desktop applications with a simple webcam and gesture recognition with the power of AI☆23Dec 3, 2019Updated 6 years ago
- pArAnoIA - Tiny "Secure" Browser☆12Nov 2, 2024Updated last year
- ☆11Nov 29, 2018Updated 7 years ago
- Automatically Scans For Default Networks & Guess The Password☆14Dec 9, 2016Updated 9 years ago
- ✨ Purpose only! The dangers of Bluetooth Low Energy(BLE)implementations: Unveiling zero day vulnerabilities and security flaws in modern …☆344May 27, 2024Updated last year
- Finding Ethereum nodes which are vulnerable to RPC-attacks☆31May 25, 2016Updated 9 years ago
- Automatically unlock your car using Arduino 101's BLE proximity and key fob iPhone app.☆32Jul 28, 2017Updated 8 years ago
- 📡 A flexible, radius based application for taking attendance☆22Sep 3, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- List of Bluetooth BR/EDR/LE security resources☆599Oct 3, 2025Updated 5 months ago
- Custom exploits☆28Apr 8, 2024Updated last year
- Application Shell for the LilyGo ESP32-S3 T-Embed☆33Apr 30, 2023Updated 2 years ago
- A tool for performing relay attacks on RFID/NFC systems (ISO 14443-4A)☆29Nov 24, 2022Updated 3 years ago
- Simple Auto WPS Pixie Dust Attack script for walking (using Wifite2)☆12Dec 22, 2019Updated 6 years ago
- The Bluetooth penetration testing tool suite☆130Feb 12, 2020Updated 6 years ago
- ☆16Jun 22, 2020Updated 5 years ago
- Unveiling Bluetooth L2CAP Vulnerabilities via State Cluster Fuzzing with Target-Oriented State Machines☆24Feb 20, 2024Updated 2 years ago
- ☆11Feb 8, 2021Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆28Feb 3, 2026Updated last month
- ApiMote IEEE 802.15.4/ZigBee Sniffing Hardware☆87Jun 1, 2014Updated 11 years ago
- A tool designed for penetration testers to perform attacks on LAN and WLAN networks, including network discovery, exploitation, and NAC b…☆45Jul 31, 2025Updated 8 months ago
- ☆32Jul 15, 2019Updated 6 years ago
- Modified proxmark3 firmware to perform brute forcing of 26-Bit ProxCards☆63Sep 25, 2016Updated 9 years ago
- Custom Fake Portal To Harvest Users Social Media Accounts☆59Mar 17, 2022Updated 4 years ago
- 👾 A command-line tool to easily run a man-in-the-middle attack leveraging ARP cache poisoning.☆13Sep 15, 2024Updated last year