Go to file
2021-05-07 20:57:56 -07:00
src added raw advertisment payload output to terminal 2021-05-07 20:57:56 -07:00
.gitignore Building TODO in README 2021-05-07 16:52:08 -07:00
go.mod Being hunted by blueZ in my nightmares... aka it fucking works again 2021-04-14 08:29:00 -07:00
go.sum Being hunted by blueZ in my nightmares... aka it fucking works again 2021-04-14 08:29:00 -07:00
main.go fixing dumb scans 2021-04-14 17:30:52 -07:00
README.md added raw advertisment payload output to terminal 2021-05-07 20:57:56 -07:00

protomolecule

Cross platform BLE scanner and logger with teeth \n

add a better description

TODO

Short Term Needs

  • Scan for

    • Device Manufacturer Data
    • Services UUIDs
  • Go channels to handle scanning (Keep continous background scanning as an option)

  • Output to simple menu for device target / attack selection (Bubbletea? Pterm?)

  • Implement bitcask DB to hold device info (will likely need a struct) ** eros **

    • MAC (Key)
    • Device Local Name (data)
    • Device Manufacturer Data (data)
    • Services UUIDs (data)
  • Implement- Exploit DB

  • If GATT exploits are known, present user with options

  • Logging

    • Exportable
  • Connect to device

  • Read / Write GATT

  • Device selection

Distant Wants

  • GATT fuzzing

  • Sweyntooth

  • Search for DFU

    • If nordic chip, use DFU attack
  • Nordic Softdevice compile with tiny go (phoebe)

    • What to do?
  • C2?