1
0
mirror of https://github.com/byReqz/blackmate.git synced 2024-11-23 19:54:55 +00:00
blackmate/categories/bluetooth

21 lines
2.7 KiB
Plaintext
Raw Normal View History

2016-06-25 13:58:53 +00:00
bluebugger|0.1|An implementation of the bluebug technique which was discovered by Martin Herfurt.|http://packetstormsecurity.com/files/54024/bluebugger.1.tar.gz.html
bluediving|0.9|A Bluetooth penetration testing suite.|http://bluediving.sourceforge.net/
bluelog|1.1.2|A Bluetooth scanner and sniffer written to do a single task, log devices that are in discoverable mode.|http://www.digifail.com/software/bluelog.shtml
bluepot|0.1|A Bluetooth Honeypot written in Java, it runs on Linux|https://code.google.com/p/bluepot/
blueprint|0.1_3|A perl tool to identify Bluetooth devices.|http://trifinite.org/trifinite_stuff_blueprinting.html
bluescan|1.0.6|A Bluetooth Device Scanner.|http://www.darknet.org.uk/2015/01/bluescan-bluetooth-device-scanner/
bluesnarfer|0.1|A bluetooth attacking tool|http://www.alighieri.org/project.html
braces|0.4|A Bluetooth Tracking Utility.|http://braces.shmoo.com/
bss|0.8|Bluetooth stack smasher / fuzzer|http://www.secuobs.com/news/15022006-bss_0_8.shtml
bt_audit|0.1.1|Bluetooth audit|http://www.betaversion.net/btdsd/download/
btcrack|1.1|The world's first Bluetooth Pass phrase (PIN) bruteforce tool. Bruteforces the Passkey and the Link key from captured Pairing exchanges.|http://www.nruns.com/_en/security_tools_btcrack.php
btscanner|2.1|Bluetooth device scanner.|http://www.pentest.co.uk
carwhisperer|0.2|Intends to sensibilise manufacturers of carkits and other Bluetooth appliances without display and keyboard for the possible security threat evolving from the use of standard passkeys.|http://trifinite.org/trifinite_stuff_carwhisperer.html
ghettotooth|1.0|Ghettodriving for bluetooth|http://www.oldskoolphreak.com/tfiles/ghettotooth.txt
hidattack|0.1|HID Attack (attacking HID host implementations)|http://mulliner.org/bluetooth/hidattack.php
obexstress|0.1|Script for testing remote OBEX service for some potential vulnerabilities.|http://bluetooth-pentest.narod.ru/
redfang|2.5|Finds non-discoverable Bluetooth devices by brute-forcing the last six bytes of the devices' Bluetooth addresses and calling read_remote_name().|http://packetstormsecurity.com/files/31864/redfang.2.5.tar.gz.html
spooftooph|0.5.2|Designed to automate spoofing or cloning Bluetooth device Name, Class, and Address. Cloning this information effectively allows Bluetooth device to hide in plain sight|http://www.hackfromacave.com/projects/spooftooph.html
tbear|1.5|Transient Bluetooth Environment Auditor includes an ncurses-based Bluetooth scanner (a bit similar to kismet), a Bluetooth DoS tool, and a Bluetooth hidden device locator.|http://freshmeat.net/projects/t-bear
ubertooth|2015.10.R1|A 2.4 GHz wireless development board suitable for Bluetooth experimentation. Open source hardware and software. Tools only.|https://github.com/greatscottgadgets/ubertooth/releases