https://github.com/flock4h/ble-spam-samsung-circuitpy
First CircuitPython implementation of Samsung BLE flood attack
https://github.com/flock4h/ble-spam-samsung-circuitpy
android-ble-spam ble-circuitpython ble-spam ios-ble ios-ble-spam samsung-ble samsung-ble-spam sour-apple sour-apple-circuitpython
Last synced: 4 months ago
JSON representation
First CircuitPython implementation of Samsung BLE flood attack
- Host: GitHub
- URL: https://github.com/flock4h/ble-spam-samsung-circuitpy
- Owner: FLOCK4H
- Created: 2024-06-09T15:07:10.000Z (about 1 year ago)
- Default Branch: main
- Last Pushed: 2024-06-09T18:10:40.000Z (about 1 year ago)
- Last Synced: 2025-01-11T08:51:21.850Z (5 months ago)
- Topics: android-ble-spam, ble-circuitpython, ble-spam, ios-ble, ios-ble-spam, samsung-ble, samsung-ble-spam, sour-apple, sour-apple-circuitpython
- Language: Python
- Homepage:
- Size: 10.7 KB
- Stars: 0
- Watchers: 2
- Forks: 1
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# Hi!
During my research on Atom S3U capabilities using CircuitPython, I've stumbled upon **_bleio** low-level **Bluetooth Low Energy** module.
Using my two other implementations, one from [Bleach](https://github.com/FLOCK4H/Bleach), second from [Jammy](https://github.com/FLOCK4H/Jammy),
that were both based on [Sour Apple Attack](https://github.com/RapierXbox/ESP32-Sour-Apple), I was able to broadcast Samsung watch devices BLE Advertisements,
which consecutively displayed pop-ups on Samsung device with an **Add New Device** request.This script **does not use any Pin references**, which means - If you have built-in BLE module, feel free to test this out.
# Details
**CircuitPython version**: 9.0.5
**External libraries**: None
**License**: MIT
**Hardware used**: Atom S3U
**Chip**: ESP32S3