Releases: GitClo/BTMagus
v0.1.3-alpha
Added an experimental BLE Spam module (spams only samsung smart watches for now)
Restructured project
Optimizations
v0.1.2-alpha
• Feature: You can now dynamically change the Bluetooth adapter path in flipper_scan
• Improved API
v0.1.1-alpha
• Fix cli output (display menu name while thread is sending message output)
First Release
BTMagus v0.1.0-alpha – Release Notes
This is the first public alpha release of BTMagus, an experimental Bluetooth exploitation and analysis toolkit written in C++.
The project is in its early stages, but the core scanning and detection engine is already functional.
Key Features
CLI Interface
Built using the excellent daniele77/cli library, providing a simple command-line experience.
Multithreading Support
You can execute commands in parallel.
Direct DBus Integration
Communicates with the BlueZ Bluetooth daemon over DBus to interact with system-level Bluetooth functions.
Current Capabilities
Bluetooth Device Scanning
Enumerates nearby BLE-capable devices in real time.
Flipper Zero Detection (🐬)
Identifies genuine Flipper Zero devices by known MAC address patterns.
Spoofed Flipper Device Detection (🎭)
Uses BLE advertisement (UUID) signatures to detect Flipper Zero devices with a spoofed mac address.
Bluetooth Flood Attack Identification
Recognizes patterns characteristic of BLE flooding attacks commonly caused by Flipper Zero spam mode.
Notes
This is an alpha release, intended for testing, feedback, and further development.
Many planned exploitation features are not yet implemented.
Full Changelog: https://github.com/GitClo/BTMagus/commits/v0.1.0-alpha