Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for bluetooth vulnerabilities
bluetooth
x
vulnerabilities
x
4 search results found
Ble Security Attack Defence
⭐
224
✨ Purpose only! The dangers of Bluetooth Low Energy(BLE)implementations: Unveiling zero day vulnerabilities and security flaws in modern Bluetooth LE stacks.
Blueborne
⭐
221
Purpose only! The dangers of Bluetooth implementations: Unveiling zero day vulnerabilities and security flaws in modern Bluetooth stacks.
Protocol Vul
⭐
59
Some Vulnerability in the some protocol are collected.
Bluetooth Cve
⭐
17
常用蓝牙漏洞CVE poc、EXP
Cve 2020 0022
⭐
5
A fully public exploit of the CVE-2020-0022 BlueFrag Android RCE Vulnerability (tested on Pixel 3 XL)
Secure Iot Healthcare Device
⭐
5
The work intends to test the data security of the IoT system since extremely sensitive data is being sent. Vulnerabilities that can lead to the leak of this personal data is found. This project illustrates a process for identifying a vulnerability and proposes a solution for mitigating the same.
Related Searches
Security Vulnerabilities (12,350)
Laravel Vulnerabilities (11,319)
Php Vulnerabilities (8,887)
Javascript Vulnerabilities (1,306)
Java Bluetooth (1,299)
Python Vulnerabilities (1,159)
Bluetooth Ble (1,109)
Python Bluetooth (895)
Arduino Bluetooth (853)
C Plus Plus Bluetooth (755)
1-4 of 4 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.