Showing 18 open source projects for "bluetooth security"

View related business solutions
  • Innovate faster with enterprise-ready generative AI—enhanced by Gemini Icon
    Innovate faster with enterprise-ready generative AI—enhanced by Gemini

    Build, deploy, and scale machine learning (ML) models faster, with fully managed ML tools for any use case.

    Vertex AI offers everything you need to build and use generative AI—from AI solutions, to Search and Conversation, to 130+ foundation models, to a unified AI platform.
  • Claims Processing solution for healthcare practitioners. Icon
    Claims Processing solution for healthcare practitioners.

    Very easy to use for medical, dental and therapy offices.

    Speedy Claims became the top CMS-1500 Software by providing the best customer service imaginable to our thousands of clients all over America. Medical billing isn't the kind of thing most people get excited about - it is just a tedious task you have to do. But while it will never be a fun task, it doesn't have to be as difficult or time consumimg as it is now. With Speedy Claims CMS-1500 software you can get the job done quickly and easily, allowing you to focus on the things you love about your job, like helping patients. With a simple interface, powerful features to eliminate repetitive work, and unrivaled customer support, it's simply the best HCFA 1500 software available on the market. A powerful built-in error checking helps ensure your HCFA 1500 form is complete and correctly filled out, preventing CMS-1500 claims from being denied.
  • 1
    bettercap

    bettercap

    The Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks

    bettercap is a powerful, easily extensible and portable framework written in Go which aims to offer to security researchers, red teamers and reverse engineers an easy to use, all-in-one solution with all the features they might possibly need for performing reconnaissance and attacking WiFi networks, Bluetooth Low Energy devices, wireless HID devices and Ethernet networks.
    Downloads: 54 This Week
    Last Update:
    See Project
  • 2
    BLEUnlock

    BLEUnlock

    Lock/unlock your Mac with your iPhone, Apple Watch, etc.

    BLEUnlock is a small menu bar utility that locks and unlocks your Mac by proximity of your iPhone, Apple Watch, or any other Bluetooth low-energy device.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    DragonOS_Focal
    ... is the straight line between you and Software Defined Radio! It leverages the portability, security, and power of Lubuntu Linux as a delivery package and operating environment for a pre-installed suite of the most powerful and accessible open source SDR software. DragonOS has verified support for a range of inexpensive and powerful SDR hardware, including RTL-SDR, HackRF One, LimeSDR, BladeRF, and many others. Check README for full list of install applications.
    Leader badge
    Downloads: 2,352 This Week
    Last Update:
    See Project
  • 4
    GoldBug - Encrypted Communications

    GoldBug - Encrypted Communications

    Chat Messenger. E-Mail-Client. Websearch. Filetransfer.

    GoldBug is a decentralized & secure communication suite that offers an integrated e-mail client, an instant messenger & a file transfer. Also included is an URL-RSS-DB & a p2p web search. Current vers. w/ McEliece Algorithm. GoldBug has been 2013 - 2023 ten years just another Graphical User Interface of the Spot-On Encryption Suite. Main GUI features: Minimal & colorful Interface with Tabs in the East. Microsoft & Qt MinGW deprecated Win32 & for Compiling: ●...
    Downloads: 13 This Week
    Last Update:
    See Project
  • Business Continuity Solutions | ConnectWise BCDR Icon
    Business Continuity Solutions | ConnectWise BCDR

    Build a foundation for data security and disaster recovery to fit your clients’ needs no matter the budget.

    Whether natural disaster, cyberattack, or plain-old human error, data can disappear in the blink of an eye. ConnectWise BCDR (formerly Recover) delivers reliable and secure backup and disaster recovery backed by powerful automation and a 24/7 NOC to get your clients back to work in minutes, not days.
  • 5
    The purpose of this is to set up a Radxa Zero 3E ( https://radxa.com/products/zeros/zero3e/ ), without wireless connectivity ( no Bluetooth or WiFi ), as an air-gapped password and security token manager, and as a store of sensitive information.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    nGold

    nGold

    Numeric Gold

    NGold is a C ++ library designed to manage monetary transactions between financial institutions. it works with or without internet connection in order to ensure the security of financial institutions that use its library and to protect currency information against computer hackers. It executes its transaction processing without the help of minors or administrators of the digital currency even if consumers or users of the digital currency are connected to the internet or offline. Not all...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    WebSploit Framework

    WebSploit Framework

    WebSploit is a high level MITM Framework

    ... Attack Vector [+]ARP Dos Attack [+]Web Killer Attack [+]Fake Update Attack [+]Fake Access point Attack [+]Wifi Honeypot [+]Wifi Jammer [+]Wifi Dos [+]Wifi Mass De-Authentication Attack [+]Bluetooth POD Attack Project In Github : https://github.com/websploit
    Downloads: 53 This Week
    Last Update:
    See Project
  • 8
    Spot-On
    Seriously entertaining dolphins on echo networks. The official source repository is located at https://github.com/textbrowser/spot-on. Downloads are located at https://github.com/textbrowser/spot-on/releases.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    AllianceROM I9305

    AllianceROM I9305

    AllianceROM For I9305 Samsung Galaxy S3 LTE

    Downloads: 2 This Week
    Last Update:
    See Project
  • Cyber Risk Assessment and Management Platform Icon
    Cyber Risk Assessment and Management Platform

    ConnectWise Identify is a powerful cybersecurity risk assessment platform offering strategic cybersecurity assessments and recommendations.

    When it comes to cybersecurity, what your clients don’t know can really hurt them. And believe it or not, keep them safe starts with asking questions. With ConnectWise Identify Assessment, get access to risk assessment backed by the NIST Cybersecurity Framework to uncover risks across your client’s entire business, not just their networks. With a clearly defined, easy-to-read risk report in hand, you can start having meaningful security conversations that can get you on the path of keeping your clients protected from every angle. Choose from two assessment levels to cover every client’s need, from the Essentials to cover the basics to our Comprehensive Assessment to dive deeper to uncover additional risks. Our intuitive heat map shows you your client’s overall risk level and priority to address risks based on probability and financial impact. Each report includes remediation recommendations to help you create a revenue-generating action plan.
  • 10
    CavitySearch is a Bash script which utilizes several methods of assessing the capabilities of Bluetooth devices. Most of the information can be gathered without pairing with the target device or alerting the end user. CavitySearch will report running services, Device Name, Device Address, Device Type, open RFCOMM Channels "ports", open L2CAP PSMs "ports", device manufacturer, supported protocols, and more. It is also able to help find "hidden" services running on the device.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11

    Bluebird Live CD

    Live distro designed for auditing Bluetooth-enabled devices.

    Bluebird is a GNU/Linux distribution designed for auditing Bluetooth-enabled devices. It is specially created for students and information security professionals. This Linux Mint based distro was specially created to carry on this project. It uses LXDE as main desktop enviroment and in its applications there are all the necessary tools to perform a complete audit.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    One day there will be a Windows 9, coming after Windows 8 and current Windows 7. Why not starting working now on a Windows 9 similar open source OS ten years before it appears instead of still working on it 10 years after it will become obsolete?
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    A system that allows people to open doors by using a Bluetooth enabled phone or other device.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Key Xchanger is a utility to send keys from your phone to your computer via a bluetooth connection
    Downloads: 1 This Week
    Last Update:
    See Project
  • 15
    d3vscan is a simple yet powerful network and Bluetooth scanner which is based on PyGTK.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    iDate searches via Bluetooth if there are potentially nice dates in your vicinity. You will be notified who is in your vicinity has iDate and whether these people could be a nice date if for each the profile matches the search profile of the other.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    A Bluetooth penetration testing suite. It implements attacks like Bluebug, BlueSnarf, BlueSnarf++, BlueSmack and has features such as Bluetooth address spoofing, an AT and a RFCOMM socket shell and a L2CAP packetgenerator.
    Downloads: 19 This Week
    Last Update:
    See Project
  • 18
    Minshara Java Bluetooth Stack is a Java (JSR-82 compliant) Bluetooth stack. It's based on javabluetooth and features RFCOMM and OBEX protocols, and also security. It's exhaustively documented and provides a bunch of samples -orson.rasip.fer.hr/~tsecen.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next