Go to file
2022-08-19 00:08:25 -04:00
src clean up and re-organize 2021-06-01 19:18:35 -07:00
.gitignore is this working? 2021-05-09 21:08:40 -07:00
go.mod implementing an improperly created fork in a semi-proper manner after excessive bashing of head into keyboard - it works 2021-05-12 17:34:38 -07:00
go.sum implementing an improperly created fork in a semi-proper manner after excessive bashing of head into keyboard - it works 2021-05-12 17:34:38 -07:00
main.go clean up and re-organize 2021-06-01 19:18:35 -07:00
ManufUUID.json hey wait a minute that's not a uint16 2021-05-30 22:07:52 -07:00
NOTES-e.md edited notes 2022-08-19 00:08:25 -04:00
README.md restructuring packages 2021-05-31 00:31:52 -07:00

protomolecule

Cross platform BLE scanner and logger with teeth

add a better description

Dev notes

  • dust util functions
  • eros found devices DB
  • phoebe tiny go stuff
  • scanStuff well i mean...
  • blueStuff connect to devices / retreive service characteristics

TODO

Short Term Needs

  • Scan for

    • Device Manufacturer Data
    • Services UUIDs
  • Go channels to handle scanning (Keep continous background scanning as an option)

  • Output to simple menu for device target / attack selection (Bubbletea? Pterm?)

  • Implement bitcask DB to hold device info (will likely need a struct) ** eros **

    • Address (Key)
    • Device Local Name (data)
    • Device Manufacturer Data (data)
    • Services UUIDs (data)
  • Implement- Exploit DB

  • If GATT exploits are known, present user with options

  • Logging

  • Connect to device

  • Read / Write GATT

  • Device selection

Distant Wants

  • GATT fuzzing

  • Sweyntooth

  • Search for DFU

    • If nordic chip, use DFU attack
  • Nordic Softdevice compile with tiny go (phoebe)

    • What to do?
  • C2?