Sniffing & Spoofingbluetoothbleappleairdropairpodsawdlsniffing

apple-bleee

apple-bleee provides experimental scripts that demonstrate what information an attacker can extract from Apple devices by sniffing Bluetooth traffic. It requires a Bluetooth adapter for BLE messages and a Wi-Fi card with monitor mode for AWDL communication.

Description

apple-bleee contains proof-of-concept scripts designed to reveal the data accessible to attackers targeting Apple devices through Bluetooth Low Energy (BLE) traffic sniffing. These scripts highlight potential privacy leaks from devices like AirPods and features such as AirDrop.

Use cases include security research, red teaming exercises, and educational demonstrations of Apple ecosystem vulnerabilities. The tool simulates attacker capabilities by capturing and analyzing BLE advertisements and related protocols, showing personal information that could be exposed without user awareness.

The scripts are experimental and require specific hardware: a Bluetooth adapter capable of sending BLE messages and a Wi-Fi card supporting active monitor mode with frame injection for AWDL (AirDrop) interactions. This setup enables realistic interception and analysis of Apple device communications.

How It Works

The scripts operate by sniffing Bluetooth Low Energy (BLE) traffic from Apple devices, parsing advertisements and state information to extract details like device identifiers, user data, and service states. Specific scripts target AirPods advertisements (adv_airpods.py), Wi-Fi details (adv_wifi.py), AirDrop leaks via AWDL protocol (airdrop_leak.py), and BLE state reading (ble_read_state.py). Additional utilities include hash2phone for number lookup, npyscreen for interfaces, opendrop2 for AirDrop simulation, and supporting utils, leveraging dependencies like python3-bluez for Bluetooth handling.

Installation

bash
sudo apt install apple-bleee

Examples

Displays help information and overview of the tool, listing available scripts in /usr/share/apple-bleee
apple-bleee -h
Analyzes BLE advertisements from AirPods to extract attacker-accessible information
python3 /usr/share/apple-bleee/adv_airpods.py
Captures and shows Wi-Fi related data leaked via BLE from Apple devices
python3 /usr/share/apple-bleee/adv_wifi.py
Demonstrates AirDrop privacy leaks using AWDL protocol sniffing
python3 /usr/share/apple-bleee/airdrop_leak.py
Reads and displays BLE state information from targeted Apple devices
python3 /usr/share/apple-bleee/ble_read_state.py
Performs hash-to-phone number lookup utility for extracted data
/usr/share/apple-bleee/hash2phone
Simulates or exploits AirDrop functionality for testing leaks
python3 /usr/share/apple-bleee/opendrop2
Updated 2026-04-16kali.org ↗