SkillAgentSearch skills...

SniffleToKismet

Proxy tool that bridges the gap between the Sniffle Bluetooth 5 long range extended sniffing and Kismet's ANTSDR capture mechanism. This tool allows users to utilize a Sniffle compatible dongle to detect Bluetooth 5 long range extended packets and relay them to Kismet through a ZMQ to TCP proxy.

Install / Use

/learn @alphafox02/SniffleToKismet
About this skill

Quality Score

0/100

Supported Platforms

Universal

README

SniffleToKismet

SniffleToKismet is a proxy tool that bridges the gap between the Sniffle Bluetooth 5 long range extended sniffing and Kismet's ANTSDR capture mechanism. This tool allows users to utilize a Sniffle compatible dongle to detect Bluetooth 5 long range extended packets and relay them to Kismet through a ZMQ to TCP proxy.

Features

  • Leverages the DroneID from DroneID GitHub.
  • Supports ZeroMQ (ZMQ) for data transmission.
  • Converts ZMQ messages to a format (mostly) compatible with Kismet's ANTSDR capture tool.
  • Provides some integration with Kismet for Bluetooth Remote ID drone detection and monitoring.

Requirements

  • Sniffle compatible dongle
  • Kismet
  • Python 3

Setup and Usage

  1. Clone the Sniffle fork:

    git clone https://github.com/bkerler/DroneID.git
    cd DroneID
    git submodule init
    git submoudule update
    
  2. Run the Sniffle receiver:

    python3 sniffle/python_cli/sniff_receiver.py -l -e -z -a --zmqsetting 127.0.0.1:4222
    

    This command configures the Sniffle dongle to look for Bluetooth 5 long range extended packets.

  3. Start the DroneID decoder in another terminal within the DroneID directory:

    python3 ./zmq_decoder.py -z --zmqsetting 127.0.0.1:4224 --zmqclients 127.0.0.1:4222
    
    
  4. Start the SniffleToKismet proxy with the correct ZMQ details:

    python3 sniffletokismet.py --zmq-host 0.0.0.0 --zmq-port 4224 --tcp-host 0.0.0.0 --tcp-port 9876
    
  5. Start Kismet

    kismet
    
  6. Start the Kismet capture tool:

    kismet_cap_antsdr_droneid --source antsdr-droneid:host=0.0.0.0,port=9876 --connect localhost:3501 --tcp
    

How It Works

  • The Sniffle compatible dongle captures Bluetooth 5 long range extended packets.
  • The captured packets are sent to the Sniffle receiver script which forwards them via ZeroMQ (ZMQ).
  • The SniffleToKismet proxy receives the ZMQ messages and translates them into a format compatible with Kismet's ANTSDR capture tool.
  • Kismet processes the data and provides enhanced drone detection and monitoring.

License

This project is licensed under the MIT License. See the LICENSE file for details.

Related Skills

View on GitHub
GitHub Stars19
CategoryDevelopment
Updated29d ago
Forks2

Languages

Python

Security Score

90/100

Audited on Feb 25, 2026

No findings