blue-hydra |
710.1c2372d |
A Bluetooth device discovery service built on top of the bluez library. |
|
bluebugger |
0.1 |
An implementation of the bluebug technique which was discovered by Martin Herfurt. |
|
bluediving |
0.9 |
A Bluetooth penetration testing suite. |
|
bluefog |
0.0.4 |
A tool that can generate an essentially unlimited number of phantom Bluetooth devices. |
|
bluelog |
1.1.2 |
A Bluetooth scanner and sniffer written to do a single task, log devices that are in discoverable mode. |
|
bluepot |
0.2 |
A Bluetooth Honeypot written in Java, it runs on Linux. |
|
blueprint |
0.1_3 |
A perl tool to identify Bluetooth devices. |
|
bluescan |
1.0.6 |
A Bluetooth Device Scanner. |
|
bluesnarfer |
0.1 |
A bluetooth attacking tool. |
|
bluphish |
9.a7200bd |
Bluetooth device and service discovery tool that can be used for security assessment and penetration testing. |
|
braces |
0.4 |
A Bluetooth Tracking Utility. |
|
bss |
0.8 |
Bluetooth stack smasher / fuzzer. |
|
bt_audit |
0.1.1 |
Bluetooth audit |
|
btcrack |
1.1 |
The world's first Bluetooth Pass phrase (PIN) bruteforce tool. Bruteforces the Passkey and the Link key from captured Pairing exchanges. |
|
btlejack |
88.c487859 |
Bluetooth Low Energy Swiss-army knife. |
|
btproxy-mitm |
71.cd1c906 |
Man in the Middle analysis tool for Bluetooth. |
|
btscanner |
2.1 |
Bluetooth device scanner. |
|
carwhisperer |
0.2 |
Intends to sensibilise manufacturers of carkits and other Bluetooth appliances without display and keyboard for the possible security threat evolving from the use of standard passkeys. |
|
ghettotooth |
1.0 |
Ghettodriving for bluetooth. |
|
hidattack |
0.1 |
HID Attack (attacking HID host implementations) |
|
obexstress |
0.1 |
Script for testing remote OBEX service for some potential vulnerabilities. |
|
redfang |
2.5 |
Finds non-discoverable Bluetooth devices by brute-forcing the last six bytes of the devices' Bluetooth addresses and calling read_remote_name(). |
|
spooftooph |
0.5.2 |
Designed to automate spoofing or cloning Bluetooth device Name, Class, and Address. Cloning this information effectively allows Bluetooth device to hide in plain sight. |
|
tbear |
1.5 |
Transient Bluetooth Environment Auditor includes an ncurses-based Bluetooth scanner (a bit similar to kismet), a Bluetooth DoS tool, and a Bluetooth hidden device locator. |
|
ubertooth |
2020.12.R1 |
A 2.4 GHz wireless development board suitable for Bluetooth experimentation. Open source hardware and software. Tools only. |
|