You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# Ubertooth One
sudo apt install ubertooth wireshark
# HackRF One
sudo apt install hackrf gr-bluetooth
# nRF52840 — flash nRF Sniffer firmware, install Wireshark plugin# BTLEJack — flash BTLEJack firmware to micro:bit# YARD Stick One
pip install git+https://github.com/atlas0fd00m/rfcat.git
Python Setup
git clone https://github.com/v33ru/bluesploit.git
cd bluesploit
pip install -r requirements.txt
Or install as a package:
pip install -e .
Quick Start
# Launch the interactive console
sudo python bluesploit.py
# List all available modules
sudo python bluesploit.py --list
Note: Most modules require root privileges for raw Bluetooth socket access.
Example Usage
bluesploit > use exploits/keystroke_injection
bluesploit (keystroke_injection) > set target AA:BB:CC:DD:EE:FF
bluesploit (keystroke_injection) > set payload hello world
bluesploit (keystroke_injection) > options
bluesploit (keystroke_injection) > run
Console Commands
Command
Description
help
Show all commands
use <module>
Select a module
set <opt> <val>
Set module option
options
Show current module options
run / exploit
Execute the selected module
back
Deselect current module
show modules
List all modules
search <term>
Search modules by name/description
info [module]
Show detailed module info
exit / quit
Exit the framework
Modules (55)
Exploits (33)
Module
CVE
Description
exploits/keystroke_injection
CVE-2023-45866
0-click Bluetooth HID keystroke injection
exploits/bluffs
CVE-2023-24023
BLUFFS session key downgrade
exploits/bluffs_mitm
CVE-2023-24023
BLUFFS active MITM attack
exploits/braktooth_esp32
CVE-2021-28139
BrakTooth ESP32 LMP crash / ACE
exploits/bluefrag
CVE-2020-0022
Android Bluetooth A2DP RCE
exploits/bias
CVE-2020-10135
BIAS authentication bypass
exploits/badkarma
CVE-2020-12351
BleedingTooth L2CAP type confusion RCE
exploits/badchoice
CVE-2020-12352
BleedingTooth A2MP info disclosure
exploits/knob
CVE-2019-9506
Key negotiation entropy check
exploits/knob_active
CVE-2019-9506
Active key entropy downgrade
exploits/sweyntooth
CVE-2019-16336+
SweynTooth BLE link-layer exploits
exploits/blueborne_linux_rce
CVE-2017-1000251
Linux BlueZ L2CAP stack overflow RCE
exploits/blueborne_leak
CVE-2017-0781
Android Bluetooth info leak
exploits/bnep_heap_disclosure
CVE-2017-13258
Android BNEP heap disclosure
exploits/whisperpair
CVE-2025-36911
Google Fast Pair hijack — force-pair without pairing mode
exploits/zephyr_ble_smp_crash
CVE-2025-10456
Zephyr RTOS BLE fixed-channel integer overflow DoS
exploits/airoha_race_chain
CVE-2025-20700/20701/20702
Airoha 3-stage BLE→Classic→RACE RCE chain
exploits/rfcomm_privesc_race
CVE-2026-23671
Windows RFCOMM driver race condition — local EoP to SYSTEM
exploits/apple_bt_dos
CVE-2026-20650
Apple BT subsystem crash via malformed packets
exploits/harmonyos_bt_oob
CVE-2026-28540
Huawei HarmonyOS Bluetooth OOB heap info disclosure