SmartGattLib
Rucky
Our great sponsors
SmartGattLib | Rucky | |
---|---|---|
- | 2 | |
277 | 485 | |
0.7% | - | |
4.7 | 2.8 | |
5 months ago | 10 months ago | |
Java | Java | |
- | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
SmartGattLib
We haven't tracked posts mentioning SmartGattLib yet.
Tracking mentions began in Dec 2020.
Rucky
What are some alternatives?
Near P2P - A P2P library for Android for discovery on local networks using UDP and transfer in general using TCP sockets
Android-PIN-Bruteforce - Unlock an Android phone (or device) by bruteforcing the lockscreen PIN. Turn your Kali Nethunter phone into a bruteforce PIN cracker for Android devices! (no root, no adb)
srsRAN_4G - Open source SDR 4G software suite from Software Radio Systems (SRS) https://docs.srsran.com/projects/4g
android-usb-gadget - Convert your Android phone to any USB device you like! USB Gadget Tool allows you to create and activate USB device roles, like a mouse or a keyboard. 🛠🛡📱
urh - Universal Radio Hacker: Investigate Wireless Protocols Like A Boss
Android-Keylogger - Android Keylogger
MifareClassicTool - An Android NFC app for reading, writing, analyzing, etc. MIFARE Classic RFID tags.
Shuttle - Shuttle Music Player
shotdroid - ShotDroid is a pentesting tool for android. There are 3 tools that have their respective functions, Get files from Android directory, internal and external storage, Android Keylogger + Reverse Shell and Take a webcam shot of the face from the front camera of the phone and PC.
hackdroid - Security Apps for Android
txTenna - route bitcoin transactions via goTenna mesh devices
Insular - A sandbox environment to clone selected apps and isolate them from accessing your personal data outside the sandbox (including call logs, contacts, photos and etc) even if related permissions are granted. Device-bound data (SMS, IMEI and etc) is still accessible.