Hacking And Exploit Development For Bluetooth Low Energy (BLE) - Sarah Mader
Bluetooth Low Energy Hacking Part 1 - Intro to Bluetooth Low Energy Security
Bluetooth Low Energy Hacking Part 2 - Sniffing Bluetooth Low Energy
Bluetooth Low Energy Hacking Part 3 - Interacting with Bluetooth Low Energy Devices
Over-the-air exploitation of a Texas Instruments Bluetooth Low Energy chip via CVE-2019-15948
Bluetooth 5 Hacking by Sultan Qasim Khan : hardwear.io webinar
Finding New Bluetooth Low Energy Exploits via Reverse Engineering Multiple Vendors' Firmwares
Bluetooth Low Energy Vulnerabilities
"Bluetooth Low Energy: Full Stack Attack" trailer
08 Developer Options Bluetooth Low Energy Hacking
How To Reverse Engineer A Bluetooth Device
Over-the-air exploitation of a Silicon Labs Bluetooth Low Energy chip via CVE-2020-15531
Spoofing attack against a smart ring using Bluetooth Low Energy (BLE)
Audit and hacking to Bluetooth Low Energy BLE devices Pablo Gonzalez CyberCamp 2019
Protecting Ethical Hacking With The CFAA? Plus: Hacking Teslas With BLE - ThreatWire
How to make Millions $$$ hacking zero days?
Attacking Bluetooth LE Design And Impl. In Mobile + Wearables by Rahul Umapathi and Nitin Lakshmanan
DragonOS Noble Wireless Hacking Devices Protocol client (Nordic nRF52840 Dongle) part 1