xecaz

I reverse engineered the BLE Analyzer pro USB and created a linux capturing tool.

26
5
100% credibility
Found Feb 26, 2026 at 20 stars -- GitGems finds repos before they trend. Get early access to the next one.
Sign Up Free
AI Analysis
C
AI Summary

This repository provides a Linux driver and command-line tool for capturing Bluetooth Low Energy advertising packets using the WCH BLE Analyzer Pro USB hardware, outputting standard PCAP files compatible with Wireshark.

How It Works

1
🔍 Discover Bluetooth spying gadget

You hear about a cheap USB tool that lets you eavesdrop on nearby Bluetooth Low Energy devices broadcasting signals.

2
🛒 Buy the WCH BLE Analyzer Pro

Pick up the small $30 USB gadget designed to capture Bluetooth signals from all three advertising channels at the same time.

3
💻 Prepare your Linux computer

Download the simple tool from this project and set it up with a quick build and install so your computer recognizes the gadget.

4
🔌 Connect the gadget

Plug the USB device into your Linux machine, and it automatically gets ready without needing special permissions after setup.

5
▶️ Begin capturing signals

Launch the capture program to save nearby Bluetooth chatter to a file and watch packets appear live on screen if you want.

📊 Explore the captured data

Open the saved file in Wireshark to see and analyze all the hidden Bluetooth advertising messages from devices around you.

Sign up to see the full architecture

4 more

Sign Up Free

Star Growth

See how this repo grew from 20 to 26 stars Sign Up Free
Repurpose This Repo

Repurpose is a Pro feature

Generate ready-to-use prompts for X threads, LinkedIn posts, blog posts, YouTube scripts, and more -- with full repo context baked in.

Unlock Repurpose
AI-Generated Review

What is BLE-Analyzer-pro-linux-capture?

This C-based tool reverse engineers the protocol of the $30 WCH BLE Analyzer Pro USB sniffer, delivering a Linux driver that WinChipHead never shipped. Plug in the hardware—three RISC-V MCUs capturing BLE 5.1 advertising channels 37/38/39 simultaneously—and run the CLI to output standard PCAP files Wireshark dissects natively, no plugins needed. It solves the pain of sniffing BLE traffic on Linux with cheap hardware, using libusb for USB bulk transfers and options like PHY selection (1M/2M/Coded), MAC filters, and channel pinning.

Why is it gaining traction?

In a world of pricey BLE analyzers, this stands out for full-spectrum advertising capture at pocket change, beating alternatives that miss channels or demand Windows. Developers dig the drop-in Wireshark compatibility and post-install no-sudo workflow via udev rules—fire up `wch_capture -w out.pcap` and analyze ADV_IND, SCAN_REQ, even some BLE 5.0 extensions right away. The github reverse engineering feat behind it hooks tinkerers chasing reverse engineered BLE analyzer tools without vendor lock-in.

Who should use this?

BLE protocol hackers debugging IoT devices, reverse engineers tracing advertising packets from fitness trackers or beacons, and embedded devs testing BLE 5.1 PHYs on Linux rigs. Ideal for security researchers sniffing unencrypted traffic or hobbyists reverse engineering BLE games and gadgets without splurging on Ubertooth or Ellisys gear.

Verdict

Grab it if you need affordable, multi-channel BLE sniffing on Linux—it's battle-tested for core advertising PDUs despite 18 stars and 1.0% credibility score signaling early maturity. Docs are solid with build steps and full CLI reference, but expect tweaks for edge cases like malformed BLE 5.0 payloads; fork and contribute to mature this github reverse engineering gem.

(198 words)

Sign up to read the full AI review Sign Up Free

Similar repos coming soon.