sniffle Logo

sniffle

0
Free
Updated 11 March 2025
Visit Website

Sniffle is a Bluetooth 5 and 4.x sniffer using TI CC1352/CC26x2 hardware, featuring support for extended length advertisement and data packets, channel selection algorithms, and PHY modes, with a Python-based host-side software and PCAP export compatibility. It supports various TI Launchpad boards and has a Wireshark compatible plugin. The tool is easy to extend and has a user-friendly interface. The setup process involves installing the required hardware devices, ARM GNU Toolchain, TI SimpleLink Low Power F2 SDK, and Python 3.9+ with PySerial. The firmware can be built using the provided makefiles and the TI SDK.

FEATURES

SIMILAR TOOLS

A honeypot that logs NTP packets into a Redis database to detect DDoS attempts.

A honeytoken-based tripwire for Microsoft's Active Directory to detect privilege escalation attempts

A next-generation intrusion prevention system that combines signature-based and behavioral detection techniques to identify and block sophisticated network threats across hybrid environments.

A python tool for discovering endpoints, parameters, and wordlists in a given target

A tool for exploiting HTTP/2 cleartext smuggling vulnerabilities

A fast CLI tool to find SSRF or Out-of-band resource load

DenyHosts is a script to block SSH server attacks by automatically preventing attackers after failed login attempts.

A multi-threading tool for sniffing HTTP header records with support for offline and live sniffing, TCP flow statistics, and JSON output.

A Python-based web application scanner for OSINT and fuzzing OWASP vulnerabilities

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

VAT: NL005301434B12

Copyright © 2025 - All rights reserved