Hacking And Exploit Development For Bluetooth Low Energy (BLE) - Sarah Mader
Bluetooth Low Energy Hacking Part 1 - Intro to Bluetooth Low Energy Security
Bluetooth Low Energy Hacking Part 2 - Sniffing Bluetooth Low Energy
Spoofing attack against a smart ring using Bluetooth Low Energy (BLE)
Bluetooth Low Energy Hacking Part 3 - Interacting with Bluetooth Low Energy Devices
08 Developer Options Bluetooth Low Energy Hacking
Over-the-air exploitation of a Texas Instruments Bluetooth Low Energy chip via CVE-2019-15948
Bluetooth Low Energy Vulnerabilities
Bluetooth 5 Hacking by Sultan Qasim Khan : hardwear.io webinar
How to make Millions $$$ hacking zero days?
Attacking Bluetooth LE Design And Impl. In Mobile + Wearables by Rahul Umapathi and Nitin Lakshmanan
Finding New Bluetooth Low Energy Exploits via Reverse Engineering Multiple Vendors' Firmwares
Audit and hacking to Bluetooth Low Energy BLE devices Pablo Gonzalez CyberCamp 2019
Over-the-air exploitation of a Silicon Labs Bluetooth Low Energy chip via CVE-2020-15531
"Bluetooth Low Energy: Full Stack Attack" trailer
Gattacking Bluetooth Smart Devices - Introducing a New BLE Proxy Tool
AppleJuice BLE Hack: Spamming Apple Devices with a Raspberry Pi Pico W!
BLE Hacking Demo: 3 - Device Interaction
Protecting Ethical Hacking With The CFAA? Plus: Hacking Teslas With BLE - ThreatWire
Scan bluetooth low energy devices using mirage and ubertooth