Bluetooth Hacking Tools

Bluetooth hacking tools are software applications designed to exploit vulnerabilities in Bluetooth-enabled devices.

There are many Bluetooth hacking tools available for different platforms, purposes and for different types of Bluetooth attacks such as Bluebugging, Bluesnarfing and Bluejacking.

Below is a table listing some Bluetooth hacking tools with their description, features and download links.

Bluetooth Hacking Tools
Name Description Features Download
Bluing Bluing (formerly bluescan) is a Bluetooth intelligence gathering tool. - Spoof BD_ADDR, Host name, Class of device.
- Collect the btsnoop log being generated.
- Discover and Sniff nearby BD_ADDR.
- Retrieve information from the SDP database of a remote BR/EDR.
- Read LMP features of a remote BR/EDR device.
bluing 0.12.0
Bluesnarfer A Bluesnarfing tool. - Unauthorized access to phonebook entries and call lists.
- Initiate voice calls from the target device.
Bluebugger A Bluebugging tool. Exploits Bluetooth bugs to gain control over devices. - Allows making calls, sending SMS, and accessing data.
- Full control over the compromised device.
bluebugger 0.1
BTCrack Bluetooth Pass phrase (PIN) bruteforce tool. - Bruteforce the Passkey and the Link key from captured pairing* exchanges
- To capture the pairing data it is necessary to have a Professional Bluetooth Analyzer.
btcrack 1.1
BtleJack Exploits BLE (Bluetooth Low Energy) vulnerabilities for security research. - Sniff, Jam and Hijack BLE devices.
- Supports multiple BLE dongles.
btlejack 2.1.1
Redfang A Bluetooth discovery tool. - Finds non-discoverable Bluetooth devices by brute-forcing the last six bytes of the device's Bluetooth address and doing a read_remote_name(). redfang 2.5
Bluediving A Bluetooth penetration testing suite. - Implements Bluesnarfing and Bluebugging attacks.
- Bluetooth address spoofing.
- L2CAP packet generation.
bluediving 0.9

Please remember that the use of Bluetooth hacking tools for unauthorized activities is illegal and unethical. They are intended for ethical security testing and research purposes only.

Like this Article? Please Share & Help Others: