Sniffle is a Bluetooth 5 and 4.x sniffer using TI CC1352/CC26x2 hardware, featuring support for extended length advertisement and data packets, channel selection algorithms, and PHY modes, with a Python-based host-side software and PCAP export compatibility. It supports various TI Launchpad boards and has a Wireshark compatible plugin. The tool is easy to extend and has a user-friendly interface. The setup process involves installing the required hardware devices, ARM GNU Toolchain, TI SimpleLink Low Power F2 SDK, and Python 3.9+ with PySerial. The firmware can be built using the provided makefiles and the TI SDK.
FEATURES
SIMILAR TOOLS
A free DNS recursive service that blocks malicious host names and protects user privacy.
Unfurl is a URL analysis tool that extracts and visualizes data from URLs, breaking them down into components and presenting the information visually.
Tor Browser is a free and open-source software that allows users to browse the internet anonymously and privately.
Snort is an open source intrusion prevention system that uses rules to detect and prevent malicious network activity.
Suricata offers real-time intrusion detection, intrusion prevention, and network monitoring.
pfSense is a leading open source firewall and network security solution, providing advanced protection and connectivity options.
A blog sharing packet capture files and malware samples for training and analysis, with archived posts and traffic analysis exercises.
A suite for man in the middle attacks, featuring sniffing of live connections, content filtering, and protocol dissection.
A Linux command-line tool that allows you to kill in-progress TCP connections based on a filter expression, useful for libnids-based applications that require a full TCP 3-way handshake for TCB creation.