nRF-Sniffer-for-802.15.4 icon indicating copy to clipboard operation
nRF-Sniffer-for-802.15.4 copied to clipboard

nRF-based 802.15.4 sniffer (firmware and software)

Results 22 nRF-Sniffer-for-802.15.4 issues
Sort by recently updated
recently updated
newest added

Is the source from which the hex files available? Is the code based on Connect SDK? Zephyr?

Add an extra argument to enable automatic channel scanning. This is managed by a seperate timer thread. Also move channel 11..26 numbers to reusable constants Signed-off-by: Joe Mullally --- If...

Maybe you could build the firmware for other devkits, like PCA10100. Thanks.

Hi experts, I followed the instructions the Readme file described. It almost works well. But I still found two issues: 1. the Startup time is too long when pressing the...

I select 2 hardware interfaces in the Capture Screen in Wireshark and click Start Capturing Packets. But then Wireshark error that "Data Written to the pipe is neither in a...

I am using the nRF52840 dongle to watch the configuration information being passed from an Osram coordinator to an Osram 4 button switch. I am finding that there are a...

When you start the sniffer you can click the gear icon to the left of the source selector and set a channel number. This will remember the channel selected from...

The **nrf802154_sniffer.py** uses is_standalone flag where the intention was to distinguish between using this script in standalone way or by Wireshark. Currently both approaches set is_standalone flag to True.

The following error is given when running the nrf802154_sniffer.py script in `Python 3.12.2`: ``` nrf802154_sniffer.py:81: SyntaxWarning: invalid escape sequence '\s' RCV_REGEX = 'received:\s+([0-9a-fA-F]+)\s+power:\s+(-?\d+)\s+lqi:\s+(\d+)\s+time:\s+(-?\d+)' ``` I was able to fix it...