11/12 free views
Tool
Other
IoT Security

CatSniffer

by ElectronicCats

651stars
88forks
27watchers
Updated 10 months ago
About

CatSniffer is a multiprotocol, multiband USB stick designed for sniffing, communicating, and attacking IoT devices using the latest radio IoT protocols.

CatSniffer is an original multiprotocol and multiband board for sniffing, communicating, and attacking IoT (Internet of Things) devices using the latest radio IoT protocols. It is a highly portable USB stick that integrates TI CC1352, Semtech SX1262, and an RP2040 for V3 or a Microchip SAMD21E17 for V2

Primary Use Case

CatSniffer is primarily used by IoT security researchers, developers, and enthusiasts to monitor, analyze, and exploit wireless communications of IoT devices across multiple protocols such as LoRa, Zigbee, and Bluetooth Low Energy. It enables detailed network monitoring and intrusion detection on various IoT radio bands, facilitating security assessments and development of custom IoT security tools.

Key Features
  • Supports multiple IoT protocols including Thread, Zigbee, BLE 5, IEEE 802.15.4g, 6LoWPAN, LoRa/LoRaWAN, Wi-SUN, Amazon Sidewalk, and mioty®
  • Integrates TI CC1352, Semtech SX1262, and RP2040 (V3) or Microchip SAMD21E17 (V2) chips for multiprotocol and multiband support
  • Highly portable USB stick form factor with SMA antenna port
  • Compatible with Windows and Linux without manual driver installation
  • Supports auto programming via TI CC bootloader and debugging via cJTAG
  • Includes general-purpose LEDs, reset buttons for multiple chips, and boot control
  • Works with multiple software tools including SmartRF Packet Sniffer, Sniffle, zigbee2mqtt, and custom CatSniffer tools
  • Open-source firmware versions maintained for backward compatibility

Installation

  • Clone the repository from https://github.com/ElectronicCats/CatSniffer
  • Choose the appropriate firmware version for your CatSniffer hardware (V2 or V3) from the repository
  • Flash the firmware onto the device using the TI CC bootloader (no external programmer required)
  • Connect the CatSniffer USB stick to your Windows or Linux machine
  • Install compatible third-party software such as SmartRF Packet Sniffer or Sniffle if needed
  • Optionally, use the custom CatSniffer-Tools software from https://github.com/ElectronicCats/CatSniffer-Tools for enhanced functionality
  • Attach an SMA antenna suitable for your target frequency band
Security Frameworks
Reconnaissance
Initial Access
Collection
Defense Evasion
Discovery
Usage Insights
  • Leverage CatSniffer for proactive IoT protocol reconnaissance to identify vulnerable devices before deployment.
  • Integrate with custom scripts to automate detection and exploitation workflows for red team exercises.
  • Use in blue team threat hunting to detect anomalous IoT wireless traffic and potential intrusions.
  • Employ in purple team scenarios to validate detection capabilities and improve IoT security posture.
  • Combine with fuzzing tools to discover unknown protocol vulnerabilities in IoT environments.

Docs Take 2 Hours. AI Takes 10 Seconds.

Ask anything about CatSniffer. Installation? Config? Troubleshooting? Get answers trained on real docs and GitHub issues—not generic ChatGPT fluff.

This tool hasn't been indexed yet. Request indexing to enable AI chat.

Admin will review your request within 24 hours

Security Profile
Red Team85%
Blue Team40%
Purple Team65%
Details
LicenseOther
LanguagePython
Open Issues20
Topics
hardware
zigbee
lora
ble
rp2040
samd21
security
security-tools
matter
sidewalk