Skip to content
June 1, 2025
  • Understanding Cryptocurrency: A Modern Metaphor Guide and Further Thoughts
  • I Got In Without A Badge Easy!? Social Engineering Strategies.
  • The Game Is Life… But What If That’s Not Just Fiction?
  • The AI Edge: Outthinking the Chaos
Bulwark-Black Security

Bulwark-Black Security

Cyber Threat Intelligence | Education | Sharing Hub

Register / Sign Up
  • Cyber Threat Intelligence
    • Russian Cyber Threat Intelligence
      • Russian Actors and Alias’s 09JAN2024
    • Chinese Cyber Threat Intelligence
      • Chinese Actors and Alias’s
    • North Korean Cyber Threat Intelligence
      • North Korean Actors and Alias’s
    • Iranian Cyber Threat Intelligence
      • Iranian Actors and Alias’s
    • Malware
      • Top 200 Malware of January 2024
    • Global Cyber Threat Intelligence
      • Global Threat Actors
  • Defensive Security
    • Detection
  • Offensive Security
    • Bug Bounty
    • Offensive Devices / Tactics
    • Red Teaming
  • AI (Artificial Intelligence)
    • AI (General)
  • Privacy & Security
    • Becoming Self Sufficient
    • Digital Assets
    • Makes you Think
    • Social Engineering
  • Research Papers
  • Training / Projects
    • Projects
    • Training
  • Blog
    • Cyber Security Blog
  • Contact
  • Our Mission
  • Donations
  • Register
  • Register
RSS
  • Home
  • Offensive Devices / Tactics
  • FAKING BLUETOOTH LE WITH AN NRF24L01+ MODULE
  • Offensive Devices / Tactics

FAKING BLUETOOTH LE WITH AN NRF24L01+ MODULE

bulwarkblack1 year ago1 year ago01 mins
Faking Bluetooth LE With An nRF24L01+ Module
Tagged: Bluetooth NRF24L01+ MODULE

Post navigation

Previous: SCADA systems: How secure are the systems running our infrastructure?⎥Malav Vyas (Security Researcher at Palo Alto Networks)
Next: Automating C2 Infrastructure with Terraform, Nebula, Caddy and Cobalt Strike

Related News

THIS WEEK IN SECURITY: LOOP DOS, FLIPPER RESPONDS, AND MORE!

bulwarkblack1 year ago1 year ago 0

SHODAN Dorks

bulwarkblack1 year ago1 year ago 0

Detecting API endpoints and source code with JS Miner

bulwarkblack1 year ago1 year ago 0

Threat Modeling LLM Applications

bulwarkblack1 year ago1 year ago 0

File Search

2
📁 Home → 📁 IOCs_YARA_TTPs_Posted_Articles ↓
ThumbNameSizeDate
Thumb AsyncRAT-loader-URL-Check.txt AsyncRAT loader URL Check.txt

text/plainAsyncRAT loader URL Check.txt

Open Download Copy Link 2.46 KB 2024-01-12 January 12, 2024 2024-01-07 January 7, 2024
2.46 KBJanuary 7, 2024
Thumb AsyncRAT-loader-hashes.txt AsyncRAT loader hashes.txt

text/plainAsyncRAT loader hashes.txt

Open Download Copy Link 662 B 2024-01-12 January 12, 2024 2024-01-07 January 7, 2024
662 BJanuary 7, 2024
Thumb Hackers-Modifying-Registry-Keys-to-Establish-Persistence-via-Scheduled-Tasks.txt Hackers Modifying Registry Keys to Establish Persistence via Scheduled Tasks.txt

text/plainHackers Modifying Registry Keys to Establish Persistence via Scheduled Tasks.txt

Open Download Copy Link 945 B 2024-01-12 January 12, 2024 2024-01-06 January 6, 2024
945 BJanuary 6, 2024
Thumb Hackers-target-Apache-RocketMQ-servers-vulnerable-to-RCE-attack.txt Hackers target Apache RocketMQ servers vulnerable to RCE attack.txt

text/plainHackers target Apache RocketMQ servers vulnerable to RCE attack.txt

Open Download Copy Link 77 B 2024-01-12 January 12, 2024 2024-01-05 January 5, 2024
77 BJanuary 5, 2024
Thumb IOC-and-TTPs-Backdoor_Win32-Carbanak-Anunak-Named-Pipe-Null-DACL.txt IOC and TTPs Backdoor.Win32 Carbanak (Anunak) - Named Pipe Null DACL.txt

text/plainIOC and TTPs Backdoor.Win32 Carbanak (Anunak) - Named Pipe Null DACL.txt

Open Download Copy Link 5.02 KB 2024-01-12 January 12, 2024 2024-01-11 January 11, 2024
5.02 KBJanuary 11, 2024
Thumb IOCs-Chapter-84-In-depth-analysis-and-technical-analysis-of-LockBit-the-top-encryption-ransomware-organization-Part-1.txt IOCs Chapter 84 In-depth analysis and technical analysis of LockBit the top encryption ransomware organization Part 1.txt

text/plainIOCs Chapter 84 In-depth analysis and technical analysis of LockBit the top encryption ransomware organization Part 1.txt

Open Download Copy Link 236 B 2024-01-12 January 12, 2024 2024-01-07 January 7, 2024
236 BJanuary 7, 2024
Thumb IOCs-and-TTPs-Financially-motivated-threat-actors-misusing-App-Installer.txt IOCs and TTPs Financially motivated threat actors misusing App Installer.txt

text/plainIOCs and TTPs Financially motivated threat actors misusing App Installer.txt

Open Download Copy Link 7.26 KB 2024-01-12 January 12, 2024 2024-01-09 January 9, 2024
7.26 KBJanuary 9, 2024
Thumb IOCs-and-TTPs_-Analysis-of-OT-cyberattacks-and-malwares.txt IOCs and TTPs_ Analysis of OT cyberattacks and malwares.txt

text/plainIOCs and TTPs_ Analysis of OT cyberattacks and malwares.txt

Open Download Copy Link 8.82 KB 2024-01-12 January 12, 2024 2024-01-09 January 9, 2024
8.82 KBJanuary 9, 2024
Thumb IOCs-and-Yara-Hundreds-of-Thousands-of-Dollars-Worth-of-Solana-Cryptocurrency-Assets-Stolen-in-Recent-CLINKSINK-Drainer-Campaigns.txt IOCs and Yara Hundreds of Thousands of Dollars Worth of Solana Cryptocurrency Assets Stolen in Recent CLINKSINK Drainer Campaigns.txt

text/plainIOCs and Yara Hundreds of Thousands of Dollars Worth of Solana Cryptocurrency Assets Stolen in Recent CLINKSINK Drainer Campaigns.txt

Open Download Copy Link 1.38 KB 2024-01-12 January 12, 2024 2024-01-11 January 11, 2024
1.38 KBJanuary 11, 2024
Thumb IOCs-and-other-AsyncRat.txt IOCs and other AsyncRat.txt

text/plainIOCs and other AsyncRat.txt

Open Download Copy Link 1.04 KB 2024-01-12 January 12, 2024 2024-01-07 January 7, 2024
1.04 KBJanuary 7, 2024
Thumb IOCs-Deceptive-Cracked-Software-Spreads-Lumma-Variant-on-YouTube.txt IOCs Deceptive Cracked Software Spreads Lumma Variant on YouTube.txt

text/plainIOCs Deceptive Cracked Software Spreads Lumma Variant on YouTube.txt

Open Download Copy Link 1.16 KB 2024-01-12 January 12, 2024 2024-01-08 January 8, 2024
1.16 KBJanuary 8, 2024
Thumb IOCs-DreamBus-Unleashes-Metabase-Mayhem-With-New-Exploit-Module.txt IOCs DreamBus Unleashes Metabase Mayhem With New Exploit Module.txt

text/plainIOCs DreamBus Unleashes Metabase Mayhem With New Exploit Module.txt

Open Download Copy Link 1.65 KB 2024-01-12 January 12, 2024 2024-01-11 January 11, 2024
1.65 KBJanuary 11, 2024
Thumb IOCs-Hide-and-Seek-in-Windows-Closet-Unmasking-the-WinSxS-Hijacking-Hideout.txt IOCs Hide and Seek in Windows' Closet Unmasking the WinSxS Hijacking Hideout.txt

text/plainIOCs Hide and Seek in Windows' Closet Unmasking the WinSxS Hijacking Hideout.txt

Open Download Copy Link 415 B 2024-01-12 January 12, 2024 2024-01-05 January 5, 2024
415 BJanuary 5, 2024
Thumb IOCs-TTPs-and-yara-Opening-a-Can-of-Whoop-Ads-Detecting-and-Disrupting-a-Malvertising-Campaign-Distributing-Backdoors.txt IOCs TTPs and yara Opening a Can of Whoop Ads Detecting and Disrupting a Malvertising Campaign Distributing Backdoors.txt

text/plainIOCs TTPs and yara Opening a Can of Whoop Ads Detecting and Disrupting a Malvertising Campaign Distributing Backdoors.txt

Open Download Copy Link 15.56 KB 2024-01-12 January 12, 2024 2024-01-09 January 9, 2024
15.56 KBJanuary 9, 2024
Thumb IOCs-Tackling-Anti-Analysis-Techniques-of-GuLoader-and-RedLine-Stealer.txt IOCs Tackling Anti-Analysis Techniques of GuLoader and RedLine Stealer.txt

text/plainIOCs Tackling Anti-Analysis Techniques of GuLoader and RedLine Stealer.txt

Open Download Copy Link 143 B 2024-01-12 January 12, 2024 2024-01-05 January 5, 2024
143 BJanuary 5, 2024
Thumb Prior-to-Cyber-Attack-Russian-Attackers-Spent-Months-Inside-the-Ukraine-Telecoms-Giant.txt Prior to Cyber Attack, Russian Attackers Spent Months Inside the Ukraine Telecoms Giant.txt

text/plainPrior to Cyber Attack, Russian Attackers Spent Months Inside the Ukraine Telecoms Giant.txt

Open Download Copy Link 168 B 2024-01-12 January 12, 2024 2024-01-07 January 7, 2024
168 BJanuary 7, 2024
Thumb yara-rules-from-100-Days-of-Yara-and-other-infor.txt yara rules from 100 Days of Yara and other infor.txt

text/plainyara rules from 100 Days of Yara and other infor.txt

Open Download Copy Link 49.69 KB 2024-01-12 January 12, 2024 2024-01-05 January 5, 2024
49.69 KBJanuary 5, 2024
Thumb Pig-butchering-is-an-evolution-of-a-social-engineering-tactic-weve-seen-for-years.txt Pig butchering is an evolution of a social engineering tactic we’ve seen for years.txt

text/plainPig butchering is an evolution of a social engineering tactic we’ve seen for years.txt

Open Download Copy Link 770 B 2024-03-22 March 22, 2024 2024-03-22 March 22, 2024
770 BMarch 22, 2024
Thumb IOCs-Curious-Serpens-FalseFont-Backdoor-Technical-Analysis-Detection-and-Prevention.txt IOCs Curious Serpens FalseFont Backdoor Technical Analysis Detection and Prevention.txt

text/plainIOCs Curious Serpens FalseFont Backdoor Technical Analysis Detection and Prevention.txt

Open Download Copy Link 501 B 2024-03-22 March 22, 2024 2024-03-22 March 22, 2024
501 BMarch 22, 2024
Thumb IOCs-The-Updated-APT-Playbook-Tales-from-the-Kimsuky-threat-actor-group.txt IOCs The Updated APT Playbook Tales from the Kimsuky threat actor group.txt

text/plainIOCs The Updated APT Playbook Tales from the Kimsuky threat actor group.txt

Open Download Copy Link 1.44 KB 2024-03-22 March 22, 2024 2024-03-22 March 22, 2024
1.44 KBMarch 22, 2024
https://bulwarkblack.com/faking-bluetooth-le-with-an-nrf24l01-module?ee=1&eeFolder=IOCs_YARA_TTPs_Posted_Articles&eeListID=2 0 1

1 - 20 21 - 21

Page: 1 of 2

20

8aeef97246

2025 Powered By BlazeThemes.