internalblue
swiftGuard
internalblue | swiftGuard | |
---|---|---|
1 | 2 | |
656 | 303 | |
1.2% | - | |
3.7 | 8.7 | |
3 months ago | 6 months ago | |
Python | Python | |
- | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
internalblue
-
Bluetooth relay attacks allow Tesla Model 3 / Y to be unlocked and driven away
I wonder how they deal with the channel hopping? I remember BT "Classic" derives the hoping sequence from the encryption key. Not sure if that changed significantly for BLE? So either they establish normal connections between relays and victims (meaning two keys, one between each relay and each victim), and then forward data coming out of the Link Layer between the attacker devices - or they need to sniff the whole spectrum in case there is just one key between car and fob.
Last time I checked, sniffing the full spectrum of BT required three SDRs, meaning six in total; making this attack rather expensive to pull off (no problem for professional thieves though, I guess). OTOH if they can use any BT stack (or manipulate it with e.g. InternalBlue[1]), potential carjackers just need two Android Phones and good WiFi :(
[1] InternalBlue: https://github.com/seemoo-lab/internalblue
swiftGuard
- SwiftGuard: USB device monitoring menu bar app for macOS
-
App to safeguard your USB ports while working
Visit the GitHub Repository to explore the code, contribute to development, or download the latest release.
What are some alternatives?
pytile - 📡 A simple Python API for Tile® Bluetooth trackers
buskill-app - BusKill's main CLI/GUI app for arming/disarming/configuring the BusKill laptop kill cord
BLEHeartRateLogger - Bluetooth Low-Energy Heart Rate Monitor data logging in Python
Metadata-Remover - A simple Metadata Removal Tool for images and videos using exiftool and ffmpeg in C and Python3.
flipperzero-firmware - Flipper Zero firmware source code
thgtoa - The comprehensive guide for online anonymity and OpSec.
bluing - An intelligence gathering tool for hacking Bluetooth
Fail2Ban - Daemon to ban hosts that cause multiple authentication errors
PayloadsAllTheThings - A list of useful payloads and bypass for Web Application Security and Pentest/CTF
macOS-Security-and-Privacy-Guide - Guide to securing and improving privacy on macOS