+++++ Dear ….. Thank you for visiting our booth at the Myanmar Black Hacking. We hope you will have a good time and enjoyed your visit to Underground. In case we won't answer some of your questions about our Real Info, we encourage you to visit our website at www.myanmarblackhacking.com +++++ It will give you a good idea of what we can do for +++++

Mar 12, 2015

2 Spoof Tooph 0.5: To Automate Cloning of Bluetooth devices

SpoofTooph is designed to automate spoofing or cloning Bluetooth device Name, Class, and Address. Cloning this information effectively allows Bluetooth device to hide in plain site. Bluetooth scanning software will only list one of the devices if more than one device in range shares the same device information when the devices are in Discoverable Mode (specifically the same Address)
Change Log v0.5:
- Fixed segmentation fault in manual assigning of Device Name and Class of Device
- Modified flags
- Depreciated
     -r: Assign random NAME, CLASS, and ADDR
     -l : Load SpoofTooph CSV logfile
     -d : Dump scan into SpoofTooph CSV logfile
- New
     -w : Write to CSV file
     -r : Read from CSV file
     -R: Assign random NAME, CLASS, and ADDR
     -m: Specify multiple interfaces during selection
     -u: USB delay. Interactive delay for reinitializing interfaces



Post a Comment