Boston-based cybersecurity startup Pwnie Express announced this week that it has open sourced two of its security products – Blue Hydra and the Android Open Pwn Project (AOPP) – in an effort to help the community address Bluetooth and IoT device threats.
Blue Hydra is a tool designed for discovering Bluetooth-enabled devices, including Internet of Things (IoT) devices, and identify threats associated with them. The product, integrated into Pwnie Express’ Pulse monitoring platform, is capable of discovering and tracking devices that use Classic and Low Energy (LE) Bluetooth, regardless of their discoverability mode.
If it finds any Bluetooth devices in range, Blue Hydra attempts to analyze them and obtain information such as device name, firmware and Bluetooth versions, manufacturer, and the services they offer.
AOPP is a variant of the Android Open Source Project (AOSP) that focuses on network security.
According to the vendor, AOPP is the first Android ROM built from the ground up for penetration testing. The product, which is fully open sourced, allows users to build their own mobile pentesting platforms on almost any Android device.
“Pwnie Express’ roots are in the open source community,” said Rick Farina, Pwnie Express director of R&D and co-inventor of Blue Hydra. “Developing and releasing open source tools reinforces our commitment to give back to the security community and make it easier for security teams to address the growing device threat landscape. These tools will help security professionals with Bluetooth visibility, which is key to effective device threat detection in our increasingly connected and IoT world.”
Pwnie Express provides solutions for detecting threats on wired, wireless and IoT devices. The company’s offering includes various penetration testing devices, including tablets (Pwn Pad), covert pentesting boxes (Pwn Plug), phones (Pwn Phone), and hardware platforms (Pwn Pro).
Related: Pwnie Express Targets Remote Locations With New Cloud-based Security Assessment Solution
Related: Attackers Increasingly Abuse Open Source Security Tools
Related: Mozilla Launches Secure Open Source Fund

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- In Other News: Government Use of Spyware, New Industrial Security Tools, Japan Router Hack
- Apple Denies Helping US Government Hack Russian iPhones
- Zero-Day in MOVEit File Transfer Software Exploited to Steal Data From Organizations
- Russia Blames US Intelligence for iOS Zero-Click Attacks
- Cisco Acquiring Armorblox for Predictive and Generative AI Technology
- Moxa Patches MXsecurity Vulnerabilities That Could Be Exploited in OT Attacks
- Organizations Warned of Salesforce ‘Ghost Sites’ Exposing Sensitive Information
- Organizations Warned of Backdoor Feature in Hundreds of Gigabyte Motherboards
Latest News
- Insider Q&A: Artificial Intelligence and Cybersecurity In Military Tech
- In Other News: Government Use of Spyware, New Industrial Security Tools, Japan Router Hack
- OpenAI Unveils Million-Dollar Cybersecurity Grant Program
- Galvanick Banks $10 Million for Industrial XDR Technology
- Information of 2.5M People Stolen in Ransomware Attack at Massachusetts Health Insurer
- US, South Korea Detail North Korea’s Social Engineering Techniques
- High-Severity Vulnerabilities Patched in Splunk Enterprise
- Idaho Hospitals Working to Resume Full Operations After Cyberattack
