bluebugger|0.1|An implementation of the bluebug technique which was discovered by Martin Herfurt.|http://packetstormsecurity.com/files/54024/bluebugger.1.tar.gz.html bluediving|0.9|A Bluetooth penetration testing suite.|http://bluediving.sourceforge.net/ bluelog|1.1.2|A Bluetooth scanner and sniffer written to do a single task, log devices that are in discoverable mode.|http://www.digifail.com/software/bluelog.shtml bluepot|0.1|A Bluetooth Honeypot written in Java, it runs on Linux|https://code.google.com/p/bluepot/ blueprint|0.1_3|A perl tool to identify Bluetooth devices.|http://trifinite.org/trifinite_stuff_blueprinting.html bluescan|1.0.6|A Bluetooth Device Scanner.|http://www.darknet.org.uk/2015/01/bluescan-bluetooth-device-scanner/ bluesnarfer|0.1|A bluetooth attacking tool|http://www.alighieri.org/project.html braces|0.4|A Bluetooth Tracking Utility.|http://braces.shmoo.com/ bss|0.8|Bluetooth stack smasher / fuzzer|http://www.secuobs.com/news/15022006-bss_0_8.shtml bt_audit|0.1.1|Bluetooth audit|http://www.betaversion.net/btdsd/download/ btcrack|1.1|The world's first Bluetooth Pass phrase (PIN) bruteforce tool. Bruteforces the Passkey and the Link key from captured Pairing exchanges.|http://www.nruns.com/_en/security_tools_btcrack.php btscanner|2.1|Bluetooth device scanner.|http://www.pentest.co.uk carwhisperer|0.2|Intends to sensibilise manufacturers of carkits and other Bluetooth appliances without display and keyboard for the possible security threat evolving from the use of standard passkeys.|http://trifinite.org/trifinite_stuff_carwhisperer.html ghettotooth|1.0|Ghettodriving for bluetooth|http://www.oldskoolphreak.com/tfiles/ghettotooth.txt hidattack|0.1|HID Attack (attacking HID host implementations)|http://mulliner.org/bluetooth/hidattack.php obexstress|0.1|Script for testing remote OBEX service for some potential vulnerabilities.|http://bluetooth-pentest.narod.ru/ redfang|2.5|Finds non-discoverable Bluetooth devices by brute-forcing the last six bytes of the devices' Bluetooth addresses and calling read_remote_name().|http://packetstormsecurity.com/files/31864/redfang.2.5.tar.gz.html spooftooph|0.5.2|Designed to automate spoofing or cloning Bluetooth device Name, Class, and Address. Cloning this information effectively allows Bluetooth device to hide in plain sight|http://www.hackfromacave.com/projects/spooftooph.html tbear|1.5|Transient Bluetooth Environment Auditor includes an ncurses-based Bluetooth scanner (a bit similar to kismet), a Bluetooth DoS tool, and a Bluetooth hidden device locator.|http://freshmeat.net/projects/t-bear ubertooth|2015.10.R1|A 2.4 GHz wireless development board suitable for Bluetooth experimentation. Open source hardware and software. Tools only.|https://github.com/greatscottgadgets/ubertooth/releases