See What Your
Bluetooth Reveals
Real-time BLE device discovery, security auditing, and GPU-accelerated 3D visualization. 8 security analyzers, compliance checking, and active testing tools — all in a native macOS app with zero external dependencies.
Everything you need to
audit Bluetooth security
From passive reconnaissance to active security testing, all in a single native macOS app.
BLE Device Discovery
Continuous scanning with real-time RSSI updates. Auto-classification into 10 device categories via service UUIDs, manufacturer data, and name heuristics.
Security Analysis Pipeline
8 specialized analyzers producing per-device threat, privacy, and GATT risk scores. Known BLE CVE matching (KNOB, BIAS, SweynTooth, BLESA).
Active Security Testing
GATT fuzzer with 4 strategies, L2CAP channel prober, BLE honeypot mode, and empirical permission probing of all characteristics.
3D Metal Visualizations
GPU-accelerated constellation view, spectrum waterfall, and topology map with interactive arcball camera. Built entirely with Metal shaders.
Apple Continuity Decoding
18 subtypes of Apple's proprietary advertisement format: AirDrop, FindMy, iBeacon, HomeKit, AirPlay, Handoff, Hey Siri, and more.
Temporal & Behavioral Analysis
Presence timelines, occupancy heatmaps, dwell time statistics, and device correlation via Jaccard similarity for identity clustering.
Signal Survey
Walk-around BLE signal survey with floor plan upload, grid-based measurement recording, and inverse distance weighted heatmap interpolation.
Compliance & Reporting
Evaluate devices against NIST SP 800-121, OWASP IoT, and BT SIG Security Mode 1. Export HTML security reports with remediation steps.
Professional-grade
security analysis
Every discovered device runs through 8 specialized analyzers, producing actionable security intelligence.
Passive Analysis
Environment & Compliance
GPU-accelerated
3D visualizations
Metal-powered real-time rendering with interactive arcball camera. Built entirely with Apple's Metal framework.
How it works
From scanning to actionable security intelligence in three steps
Scan
Launch the app, grant Bluetooth permission, and start scanning. Devices appear in real-time with RSSI, category classification, and manufacturer identification.
Analyze
Every device automatically runs through 8 security analyzers. Privacy score, threat level, and GATT risk are computed in real-time with actionable findings.
Act
Export findings as comprehensive HTML security reports, CSV data, or JSON. Track devices over time with presence timelines and occupancy heatmaps.
Ready to see what Bluetooth reveals?
Uncover the hidden BLE landscape around you. From passive scanning to active security testing, all in a single native macOS app.