Bluetooth PIN and LINK-KEY Cracker - Bluetooth Cracker reconstructs the PIN and LINKEY with data sniffed during a pairing exchange. The calculated PIN can be used to authenticate against a device in Pairing Mode (usualy with a hardcoded PIN), the LINKEY however can be used for to get complete access to the Master and the Slave without any Interaction from the user of these devices. Furthermore the resulting Link-key can be used to decrypt the Datastreams between these devices.
You need access to a Bluetooth Sniffer Device and Software (FTE, others) in order to capture the exchanges, there have been rumors these Sniffers can be created from a standard USB Dongle.
This is a Proof of Concept tool from n.runs AG and is released under the License set forward in the LICENSE text file
Website Spy Monitor 2010 Website Spy Monitor spy software can secretly record all websites visited. It runs in a complete invisible mode. You can check logs by simply receiving emails or opening a web page. Useful for knowing what people are doing online.
Free Spyware Begone 2009 Free Spyware Removal Forever - Spyware Begone will scan your PC for thousands of infections and errors. Download now
ID Devices Lock ID Devices Lock ensures your data safety by preventing it from being stolen from your personal files or folders.
QwikSecure File Protection System QwikSecure is an easy way to hide your sensative data on your business or personal computer. QwikSecure allows you to hide your files and folders from prying eyes. Hidden objects cannot be seen using any explorer tool, browser or the command prompt.
PassDB Win Database to store and manage your Accounts, Usernames and Passwords, your URLs and Projects, MS Windows Version.
PassDB Mac Database to store and manage your Accounts, Usernames and Passwords, your URLs and Projects, Mac OS X Version.
Version: 1.1 Released: May, 18 2007 License: Freeware, $0.00 Expires: Never Expires
File size: 33 K Platforms: Windows XP/2000/98/95 Downloads: 52
Bluetooth PIN and LINK-KEY Cracker - BTCrack reconstructs the PIN and LINK-KEY with data sniffed during a pairing exchange. The calculated PIN can be used to authenticate against a device in Pairing Mode and the LINK-KEY to authenticate against both.