Blue-Jammer Pro is a high-performance Bluetooth security auditing framework. It identifies nearby devices, performs vendor lookups, and conducts protocol-level stress testing on Kali Linux.
- 🔍 Intel Engine: Instant MAC OUI vendor identification (Apple, Samsung, etc.).
- 📡 Stealth Scan: Continuous background monitoring for new targets.
- 💥 Hardware Stressing: L2CAP and SDP flooding capabilities for auditing.
- 💻 Dual-Mode: Automatic simulation for Windows and raw hardware access for Linux.
Follow these exact steps to set up the tool:
git clone [https://github.com/RAJ015HACKING/Blue_jammer.git](https://github.com/RAJ015HACKING/Blue_jammer.git)cd Blue_jammerInstall the required Python modules globally on your system:
pip3 install -r requirements.txt --break-system-packages(Note: Use --break-system-packages if you are on the latest Kali Linux version).
Make the Linux launcher executable:
chmod +x Blue_jammer.shRun the automated launcher to start auditing:
./Blue_jammer.sh-
blue_jammer.py: Main Python engine.
-
Blue_jammer.sh: Automation script for hardware and environment setup.
-
requirements.txt: Python dependency list.
-
.gitignore: Files excluded from the repository.
This tool is strictly for educational and authorized security auditing purposes. Misuse of this tool is illegal. The developer is not responsible for your actions.