Samsung BLE Spam - sayotte/ESP32Marauder GitHub Wiki
Samsung BLE Spam
This vulnerability and exploit was discovered and developed by Spooks4576. It causes Samsung devices to receive BLE Watch pair spam which renders the affected device near useless while the attack is running. To exit the attack, press anywhere on the screen and you will be returned to the Marauder menu.
Menu Path
Bluetooth
>Bluetooth Attacks
>Sour Apple
CLI
This function is available for use via the Marauder CLI. The following documentation describes command usage. The Samsung BLE Spam function can be stopped with stopscan.
Usage
blespam -t samsung