Skip to content

Menu

  • CURRENT WORLD GAME
  • LICENSE BY HARVARD UNIVERSITY
  • LIVECHAT/DISCORD
  • ORDER SERVER
  • OUR MEMBER LIST
  • POEM OF US
  • WATCH LIVE ANIME

Archives

  • July 2025

Calendar

July 2025
M T W T F S S
 123456
78910111213
14151617181920
21222324252627
28293031  
     

Categories

  • 0day
  • 0day Anime Watch Online
  • AI Secret
  • AntiVirus Evasion Technique
  • Blackcat Anime
  • Crayon Sinchan
  • Demon School! Iruma-kun
  • Donald Duck And Friend
  • Dr. Stone Season 1
  • Dr. Stone Season 2
  • Exploit-0day
  • Fairy Tail
  • God and Christianity
  • How Everything Work PHD Thesis
  • Hunter X Hunter
  • PHD THESIS
  • Project
  • Public-Release-Code
  • Ragna Crimson
  • Rurouni Kenshin -Kyoto Disturbance-
  • Security Tutorial
  • The Seven Dealy Sins
  • Uncategorized
  • World Game By Us
  • World Havoc Tarif
  • World Tarif Secret
  • WormGPT

Copyright [ 0day (xc) Our ] Whitehat Hacker Team Official Website 2025 | Theme by ThemeinProgress | Proudly powered by WordPress

  • CURRENT WORLD GAME
  • LICENSE BY HARVARD UNIVERSITY
  • LIVECHAT/DISCORD
  • ORDER SERVER
  • OUR MEMBER LIST
  • POEM OF US
  • WATCH LIVE ANIME
[ 0day (xc) Our ] Whitehat Hacker Team Official Website
You are here :
  • Home
  • 0day ,
  • Exploit-0day
  • PEW PEW HACKING YOUR FRIEND BLUETOOH CONVERSATION AND LOGGING ALL YOUR EARPHONE … . EXPLOIT CODE BY SKRAITO WITH SKRAITOW ( LORD JESUS CHRIST ) … .
Written by skraitoJuly 12, 2025

PEW PEW HACKING YOUR FRIEND BLUETOOH CONVERSATION AND LOGGING ALL YOUR EARPHONE … . EXPLOIT CODE BY SKRAITO WITH SKRAITOW ( LORD JESUS CHRIST ) … .

0day . Exploit-0day Article

PEW PEW – PoC to record audio from a Bluetooth device

proof of concept to record and replay audio from a bluetooth device without the legitimate user’s awareness.

Requirements

The code is written in Python and has been tested with Python 3.11.8, but it mainly uses widely available tools in Linux systems.

The PoC uses the following tools:

  • bluetoothctl
  • btmgmt
  • pactl
  • parecord
  • paplay

In Arch Linux distributions, bluetoothctl and btmgmt can be installed with the package bluez-utils, while pactl, parecord and paplay are available in the libpulse package.

For the PoC to work, it is necessary to have a working installation of the BlueZ Bluetooth stack, available in the bluezpackage for Arch Linux distributions. A working installation of an audio server compatible with PulseAudio, such as PipeWire, is also required to record and play audio.

Setup

Ensure that your device is capable of functioning as an audio source, meaning it has a microphone, and that it is discoverable and connectable via Bluetooth.

For instance, to be discoverable and connectable, the earbuds used during the talk must be outside of their charging case. By default, they only activate the microphone when placed in the user’s ears, although this setting can be adjusted in the configuration app.

Additionally, ensure that the device is not already connected, or alternatively, that it supports multiple connections.

Execution

Firstly, the address of the device must be discovered using a tool such as bluetoothctl:

$ bluetoothctl
[bluetooth]# scan on

Once the address of the device is discovered, the script can handle the rest:

$ python BlueSpy.py -a <address>

Note: The script might prompt for superuser permissions to modify the configuration of your BlueZ instance and pair it with the remote device.

Troubleshooting

BlueSpy.py is the main script that executes every step of the process. However, if you encounter issues with any of the phases, so it might be helpful to execute them individually:

  • pair.py utilizes the command-line tool btmgmt to modify the configuration of your BlueZ and initiate a pairing process with the remote device. The exact commands used are in the pair function inside core.py.
  • connect.py utilizes the command-line tool bluetoothctl to initiate a quick scan (necessary for BlueZ) and establish a connection to the device. The exact commands used are in the connect function inside core.py.
  • just_record.py utilizes the command-line tools pactl and parecord to search for the device in the system’s audio sources (it must function as a microphone) and initiate a recording session. The exact commands used are in the record function inside core.py.
  • The playback function inside core.py executes paplay to play back the captured audio.

If you encounter issues with any of the phases, examine the commands in core.py and try to execute them in a shell. This will provide more information on what may be failing.

https://www.worldhacker.org/download-0day.xc.Our.license.apply/pewpew.bluetoohsniffer.zip

You may also like

[ 0day (xc) Our ] File Upload Vulnerabilities and Security Best Practices by skraitow ( Lord Jesus Christ ) with skraito , HAVE FUN READING … .

[ 0day (xc) Our ] Research How to By pass antivirus while developing malware by skraito and Lord Jesus Christ any comment ? how to ? please include in Our comment … . Antivirus and EDR Bypass Techniques by vaadata … .

[ 0day (xc) Our ] Pew Pew 0day MikroTik RouterOS Cross Site Scripting 2025 Code by skraito with skraitow … . Have Fun Patching it … .

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Archives

  • July 2025

Calendar

July 2025
M T W T F S S
 123456
78910111213
14151617181920
21222324252627
28293031  
     

Categories

  • 0day
  • 0day Anime Watch Online
  • AI Secret
  • AntiVirus Evasion Technique
  • Blackcat Anime
  • Crayon Sinchan
  • Demon School! Iruma-kun
  • Donald Duck And Friend
  • Dr. Stone Season 1
  • Dr. Stone Season 2
  • Exploit-0day
  • Fairy Tail
  • God and Christianity
  • How Everything Work PHD Thesis
  • Hunter X Hunter
  • PHD THESIS
  • Project
  • Public-Release-Code
  • Ragna Crimson
  • Rurouni Kenshin -Kyoto Disturbance-
  • Security Tutorial
  • The Seven Dealy Sins
  • Uncategorized
  • World Game By Us
  • World Havoc Tarif
  • World Tarif Secret
  • WormGPT

[ 0day (xc) Our ] CopyRight License Apply ... .