1,435 skills found · Page 2 of 48
OpenTracksApp / OpenTracksRepository moved to: https://codeberg.org/OpenTracksApp/OpenTracks
The nRF Toolbox is a container app that stores your Nordic Semiconductor apps for Bluetooth Low Energy in one location.
paypal / GattGatt is a Go package for building Bluetooth Low Energy peripherals
JuulLabs / KableKotlin Asynchronous Bluetooth Low-Energy
deviceplug / BtleplugRust Cross-Platform Host-Side Bluetooth LE Access Library
don / BluetoothSerialCordova (PhoneGap) Plugin for Serial Communication over Bluetooth
bluez / BluezMain BlueZ tree
h2zero / NimBLE ArduinoA fork of the NimBLE library structured for compilation with Arduino, for use with ESP32, nRF5x.
k3yomi / Wall Of FlippersA simple and easy way to find Flipper Zero Devices and Bluetooth Low Energy Based Attacks
chipweinberger / Flutter Blue PlusFlutter plugin for connecting and communicationg with Bluetooth Low Energy devices, on Android, iOS, macOS, Web, Linux, Windows.
inthehand / 32feetPersonal Area Networking for .NET. Open source and professionally supported
don / Cordova Plugin Ble CentralBluetooth Low Energy (BLE) Central plugin for Apache Cordova (aka PhoneGap)
tinygo-org / BluetoothCross-platform Bluetooth API for Go and TinyGo. Supports Linux, macOS, Windows, and bare metal using Nordic SoftDevice or HCI
rabschi / Awesome BeaconA curated list of awesome Bluetooth beacon software and tools.
d4rken-org / CapodA companion app for AirPods on Android.
JiaoXianjun / BTLEBluetooth Low Energy (BLE) packet sniffer and transmitter for both standard and non standard (raw bit) based on Software Defined Radio (SDR).
asterics / Esp32 Mouse KeyboardESP32 implementation for HID over GATT Keyboard and Mouse (Bluetooth Low Energy). Including serial API for external modules (similar to Adafruit EZKey HID)
Device Firmware Update library and Android app
jnross / BluetilityA Bluetooth Low Energy browser, an open-source alternative to LightBlue for OS X
securing / GattackerA Node.js package for BLE (Bluetooth Low Energy) security assessment using Man-in-the-Middle and other attacks