BTMagus is an experimental Bluetooth exploitation and analysis toolkit written in C++.
It is currently in early development but already provides a functional scanning and detection engine.
Built using the lightweight and powerful daniele77/cli library.
Commands can run in parallel.
Communicates with the BlueZ Bluetooth daemon over DBus for low-level BLE interaction.
-
Bluetooth Device Scanning
Enumerates nearby BLE devices in real time. -
Flipper Zero Detection (🐬)
Detects genuine Flipper Zero devices based on their MAC address patterns. -
Spoofed Flipper Detection (🎭)
Identifies Flipper devices with faked MAC addresses using BLE advertisement UUIDs. -
Bluetooth Flood Attack Detection
Recognizes BLE spam attacks caused by the Flipper Zero. -
Bluetooth Spam Attack Module (New)
Performs BLE flood attacks similar to the Flipper Zero for testing and analysis.
- Improved accuracy of flood attack detection
- Optional logging features implemented
- Active Bluetooth exploitation utilities
- Custom attack modules
- Extended BlueZ control features
- Plugin system for custom analyzers
Go to the Releases page:
https://github.com/GitClo/BTMagus/releases
Download the latest binary for your architecture.
BTMagus requires a Linux environment with BlueZ installed.
You must run the binary with root privileges to access the Bluetooth adapter.
# Give execution permissions
chmod +x btmagus
# Run as root
sudo ./btmagus