Skip to content

NSM-Barii/framework

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

40 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

IoT Exploitation Framework

A comprehensive toolkit for security testing and vulnerability research on IoT devices through BLE, WiFi, and UART attack surfaces.

⚠️ This project is actively in development. New features and modules are being added regularly. Expect frequent updates and improvements.


Features

  • BLE Exploitation

    • Wardriving with automatic data logging
    • Device enumeration and GATT service dumping
    • Connection spam attacks
    • Fuzzing with customizable payloads
  • WiFi Analysis

    • Wireless reconnaissance
    • Packet analysis
  • Hardware Protocols

    • UART interface testing
  • Mobile Security

    • Rooted Android integration (Magisk)
    • Frida runtime instrumentation

Installation

Quick Setup

# Clone the repository
git clone github.com/NSM-Barii/framework
cd framework/py_modules

# Create and activate virtual environment
python3 -m venv venv
source venv/bin/activate

# Install BlueZ driver (Linux only)
# Ubuntu/Debian:
sudo apt-get install bluez bluez-tools libbluetooth-dev

# Arch Linux:
sudo pacman -S bluez bluez-utils

# Install Python dependencies
pip install -r requirements.txt

Running the Framework

# Must run with sudo for BLE access
sudo venv/bin/python3 main.py

Usage

Run the framework without arguments to see the help menu:

sudo venv/bin/python3 main.py

Common Commands

BLE Scanning:

sudo venv/bin/python3 main.py -s              # Basic BLE scan
sudo venv/bin/python3 main.py -sv             # Scan with vendor lookup
sudo venv/bin/python3 main.py -t 20           # Set scan timeout (seconds)

BLE Wardriving:

sudo venv/bin/python3 main.py -w              # Wardriving mode
sudo venv/bin/python3 main.py -wv             # Wardriving with verbose output

BLE Exploitation:

sudo venv/bin/python3 main.py -m <MAC> -d     # Dump GATT services
sudo venv/bin/python3 main.py -m <MAC> -c     # Connection spam
sudo venv/bin/python3 main.py -m <MAC> -cp    # Connection + pairing spam
sudo venv/bin/python3 main.py -m <MAC> -f     # Fuzz all characteristics

Advanced Fuzzing:

sudo venv/bin/python3 main.py -m <MAC> -ft <UUID> --send write --response 1

Telnet Bruteforce:

sudo venv/bin/python3 main.py --telnet

Project Structure

ble/
├── py_modules/
│   ├── main.py              # Main entry point
│   ├── nsm_ble.py           # BLE modules
│   └── nsm_telnet.py        # Telnet bruteforce
├── root_pixel7a/            # Android rooting guides
└── README.md

Requirements

  • Linux (Ubuntu/Debian/Arch)
  • Python 3.x
  • Bluetooth adapter (for BLE testing)
  • Root access on Android device (for mobile features)

Disclaimer

This tool is intended for authorized security research and testing only. Unauthorized access to devices or networks is illegal. The author is not responsible for misuse of this framework.


Author

NSM-Barii


License

[Specify your license here]

About

IoT Explotation Framework

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors