A Bluetooth experimentation framework for Broadcom and Cypress chips that enables firmware patching and packet injection.
InternalBlue is a Bluetooth experimentation framework designed for Broadcom and Cypress Bluetooth chips. It reverse-engineers how operating systems patch firmware and enables researchers to modify firmware, inject packets, and monitor Bluetooth connections on real devices. This allows for advanced security testing and performance analysis without needing specialized radio hardware.
Security researchers, Bluetooth protocol developers, and academics focused on wireless security who need to experiment with low-level Bluetooth firmware and packet manipulation on off-the-shelf hardware.
InternalBlue provides direct access to Bluetooth firmware patching and packet injection on real devices, unlike software-defined radio alternatives. It supports encrypted connections, full packet capture, and integrates with other research tools like Frankenstein for comprehensive Bluetooth stack analysis.
Bluetooth experimentation framework for Broadcom and Cypress chips.
Allows patching of Broadcom and Cypress Bluetooth firmware on off-the-shelf devices, enabling custom features without expensive software-defined radio setups, as detailed in the firmware overview.
Captures all packets with no loss, works with encrypted connections and Classic Bluetooth, and supports packet injection into existing links for thorough security testing.
Used to implement attacks like KNOB and BIAS, and integrates with tools like Frankenstein for fuzzing, demonstrating real-world applicability in vulnerability discovery.
Runs on Android, iOS, macOS, Linux, and user-space implementations, though with specific requirements like rooting or jailbreaking, as noted in the OS-specific setup docs.
Needs rooted Android or jailbroken iOS, adding setup complexity and limiting use on unmodified devices, with workarounds for protections like Spectra noted in the documentation.
Only supports Broadcom and Cypress Bluetooth chips, excluding other vendors and potentially newer chips not yet reverse-engineered, which restricts hardware compatibility.
Involves firmware-specific patches and bypasses for security features, requiring deep technical knowledge and ongoing updates, as highlighted in the setup and firmware docs.
An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.
Documentation:
A collection of android Exploits and Hacks
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.