Table of Contents
Warning
Using this app to disrupt or crash other people's devices without their consent may be illegal in your jurisdiction. The iOs crash mode explicitly crashes nearby unpatched iOS devices. Use responsibly and only on devices you own or have permission to test.
BLESpam continuously transmits spoofed Bluetooth Low Energy advertisement packets to trigger pairing popups, notifications, or instability on nearby devices. The MAC address and BLE channel (37, 38, or 39) are randomised automatically with each new packet. Each packet is transmitted 4 times before the app moves to the next one.
The protocol implementations are ported from the Flipper Zero Xtreme-Apps BLE spam module.
Attack Mode
Select the target platform or behaviour from the dropdown:
- Android — Sends Google FastPair advertisement packets. Triggers a pairing popup on nearby Android phones. Android applies a per-device cooldown of approximately 15 minutes before showing the popup again.
- iOs — Sends Apple Continuity packets (Proximity Pair or Nearby Action type, chosen randomly). Triggers device suggestion notifications on nearby iOS devices. Effect depends on iOS version.
- iOs crash — Sends a specially crafted Apple Continuity packet. Causes unpatched iOS devices to crash after approximately one minute. A power cycle recovers the device.
- Windows — Sends Swift Pair packets. Triggers a device popup on nearby Windows machines. Behaviour depends on patch level and supported hardware.
- Samsung — Sends Samsung EasySetup packets (Galaxy Buds or Galaxy Watch models, chosen randomly). Triggers a pairing popup on nearby Samsung devices.
- NameSpam — Broadcasts one of 9 fixed device names as a generic HID device advertisement:
PortaHack,PwnBt,iSpam,GenericFoodVagon,SignalSnoop,ByteBandit,RadioRogue,RadioRebel,ByteBlast. The name is chosen randomly each cycle. - NameRandom — Broadcasts a randomly generated 9-character alphanumeric string as the device name. A new name is generated each cycle.
- All-Safe — Cycles randomly through all modes except iOs crash.
- All — Cycles randomly through all modes including iOs crash.
Controls
- Start / Stop: Begins or halts transmission.
- Rnd device (checkbox, default: on): When enabled, the device model or payload is randomised with each packet change. When disabled, the same payload is retransmitted repeatedly (MAC and channel are still randomised).
Display
The console area shows the raw advertisement data hex of the current packet, updated approximately every 25 packet changes.
Settings Persistence
Settings are saved to tx_blespam.ini.
This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.
Start here
Contributors
How to collaborate
Contributing Guidelines
How to ask questions correctly
Hardware
- PortaPack Versions (which one to buy)
- Features
- HackRF Versions
- Description of the hardware
- Enclosure/cases
- Repairs
- Mods
User manual
Intended use and Legality
- Usage cautions
- First steps
- Firmware update procedure
- User interface
- Powering the PortaPack
- Troubleshooting
- Won't boot
- Config Menu
- Firmware upgrade
- Diagnose firmware update in Windows
- Receive Quality Issues
- No TX/RX
- TX Carrier Only
- H2+ speaker modifications
- Dead Coin Cell Battery
- Factory Defaults
- SD card not recognized by PC with the SD-card over USB selected
- DFU overlay
- Full reset
- SolveBoard
- How to Format SDCard
- What if I don't like some of the apps
Applications
- 📥 Receivers
- 📤 Transmitters
- ADS-B(S) TX
- Adult Toys
- APRS TX
- BHT Xy/EP
- BLE TX
- BLESpam
- Burger Pager
- CVS Spam
- EPIRB
- FlipperTX
- GPS Sim
- Hopper
- Jammer
- KeeLoq TX
- Key fob TX
- LGE Tool
- MDC-1200 TX
- Morse TX
- OOK
- OOK Brute
- OOK Editor
- P25 TX
- POCSAG TX
- RDS
- RTTY TX
- SAME TX
- Signal gen
- Soundboard
- Spectrum Painter
- SSTV
- TEDI/LCR
- TouchTunes
- TPMS TX
- 🔄 Transceivers
- 🟡 Recon
- 🔴 Capture
- ▶️ Replay
- 🖲️ Remote
- 🔍 Looking Glass
- 🛠️ Utilities
- 🎮 Games
- ⚙️ Settings
- 💻 HackRF Mode
Misc
Developer Manual
- Compilation of the firmware
- Compile on WSL with ninja
- How to compile on Windows faster with WSL 2
- Using Docker and Kitematic
- Docker command-line reference
- Using Buddyworks and other CI platforms
- Notes for Buddy.Works (and other CI platforms)
- Using ARM on Debian host
- All in one script for ARM on Debian host
- Compile on Arch based distro (exclude Asahi), or other weird distros
- Dev build versions
- Notes About ccache
- Create a custom map
- Code formatting
- PR process
- Description of the Structure
- Software Dev Guides
- Tools
- Research
- UI Screenshots
- Maintaining
- Creating a prod/stable release (Maintainers only)
- Maintaining rules
- Development States Notes
This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.
Note
The wiki is incomplete. Please add content and collaborate.
Important
- This is a public wiki. Everything is visible to everyone. Don't use it for personal notes.
- Avoid linking to external tutorials/articles; they may become outdated or contain false information.