sniffle Logo

sniffle

0
Free
Visit Website

Sniffle is a Bluetooth 5 and 4.x sniffer using TI CC1352/CC26x2 hardware, featuring support for extended length advertisement and data packets, channel selection algorithms, and PHY modes, with a Python-based host-side software and PCAP export compatibility. It supports various TI Launchpad boards and has a Wireshark compatible plugin. The tool is easy to extend and has a user-friendly interface. The setup process involves installing the required hardware devices, ARM GNU Toolchain, TI SimpleLink Low Power F2 SDK, and Python 3.9+ with PySerial. The firmware can be built using the provided makefiles and the TI SDK.

FEATURES

ALTERNATIVES

A blog sharing packet capture files and malware samples for training and analysis, with archived posts and traffic analysis exercises.

Smart traffic sniffing tool for penetration testers

TCPFLOW is a tool for capturing data transmitted over TCP connections.

A tool for parsing Google Protobuf encoded blobs without the accompanying definition, providing a colored representation of the contents.

A set of Go-based emulators for testing network security and analyzing network traffic.

A low-interaction honeypot for detecting and analyzing potential attacks on Android devices via ADB over TCP/IP

A suite for man in the middle attacks, featuring sniffing of live connections, content filtering, and protocol dissection.

MIDAS (Mac Intrusion Detection Analysis System) - archived and no longer supported.