Loading...
Sniffle is a Bluetooth 5 and 4.x sniffer using TI CC1352/CC26x2 hardware, featuring support for extended length advertisement and data packets, channel selection algorithms, and PHY modes, with a Python-based host-side software and PCAP export compatibility. It supports various TI Launchpad boards and has a Wireshark compatible plugin. The tool is easy to extend and has a user-friendly interface. The setup process involves installing the required hardware devices, ARM GNU Toolchain, TI SimpleLink Low Power F2 SDK, and Python 3.9+ with PySerial. The firmware can be built using the provided makefiles and the TI SDK.
Common questions about sniffle including features, pricing, alternatives, and user reviews.
sniffle is A Bluetooth 5 and 4.x sniffer using TI CC1352/CC26x2 hardware with advanced features and Python-based host-side software.. It is a Security Operations solution designed to help security teams with PCAP, Bluetooth, Packet Capture.
Automated network packet recording and breach investigation tool for IR teams.
Get strategic cybersecurity insights in your inbox
Cloud-based bare-metal malware analysis lab for SOC, CERT & CIRT teams.
A script for extracting network metadata and fingerprints such as JA3 and HASSH from packet capture files or live network traffic.
pcapfex is a forensic tool that extracts files from packet capture data by analyzing network traffic and identifying embedded file content.