We now have a public discord server for WHAD 🥳
Feel free to join, ask for help, help others, and discuss features you want to see in a future release !
| Website | https://whad.io |
| Github | https://github.com/whad-team |
| Discord | https://discord.gg/bjNk8Sm59P |
We now have a public discord server for WHAD 🥳
Feel free to join, ask for help, help others, and discuss features you want to see in a future release !
New releases of WHAD and ButteRFly! 🥳
- WHAD v1.2.15 has just been released and fixes many critical issues.
- ButteRFly v1.1.3 has also been released to include a fix related to Logitech's Unifying protocol submitted by gentilkiwi.
More information on https://github.com/whad-team/whad-client/releases/tag/v1.2.15 and https://github.com/whad-team/butterfly/releases/tag/v1.1.3.
ButteRFly version 1.1.1 has just been released, fixing a flashing issue related to nRF52 USB dongles based on Nordic nRF52840 SoC revision 1 (Engineering C.1) like clones sold on AliExpress.
Our latest version also supports BLE 5.x sniffing (CSA #2 support with 1M/2M PHY at the moment) and improves connection request sniffing.
If you used a nRF52 USB dongle with ButteRFly and had issues, you should consider giving this improved version a try 😊.
More information on https://github.com/whad-team/butterfly/releases/tag/v1.1.1
Version 1.2.13 has been released 🥳
This version fixes many regressions introduced in a recent code refactoring that broke ESB packet sniffing and injection.
Version 1.2.12 is now available!
This version fixes (again) multiple bugs, but also simplifies the Bluetooth Low Energy API.
Please read the release notes to learn more about the new features shipped with this release 😊, and happy wireless hacking !
Many thanks to folks who attended our workshops in 2025 and found numerous bugs and unexpected behaviors! And huge thanks to those who reported bugs and suggested fixes on Github too! 🙏
https://github.com/whad-team/whad-client/blob/main/RELEASE_NOTES.md
🥳 version 1.2.11 has just been released!
This version fixes multiple bugs and significantly improves performances.
Please read the release notes to learn more about the new features shipped with this release 😊, and happy wireless hacking !
https://github.com/whad-team/whad-client/blob/main/RELEASE_NOTES.md
🇬🇧 Next WHAD workshop on BLE hacking will be held at @UYBHYS on Nov, 7. This workshop will be given in French, registration is mandatory to attend (but some seats are still available 😊)
🇫🇷 Le prochain workshop WHAD version BLE hacking se tiendra le 7 novembre lors de l'évènement @UYBHYS. L'atelier sera animé en français et les inscriptions sont obligatoires (mais il semble rester des places 😊)
We released a new version 1.2.10 before our workshop at #BruCON0x11 earlier this week 🥳
This version includes a complete refactoring of WHAD's internals, some bugs fixed in our BLE stack as well as other boring bugs in some of our CLI tools.
BTW, the workshop went quite well but we had some issues with our own access point and VM setup 😬... We are currently working on a better setup and are seriously thinking about a training to be able to cover all the aspects of this framework.
WHAD 1.2.9 has just been released ! A lot of cleaning has been done as well as some bugs fixed. More importantly, documentation has been improved 😀
We are currently rewriting WHAD's core modules to improve performances and stability, and adding a lot more unit tests... It will take some time but brace yourselves, it should be included in our next release !
Hack the planet (without wires) 😜 !
https://github.com/whad-team/whad-client/releases/tag/v1.2.9
Following @rcayre and @virtualabs talk at @sstic, WHAD version 1.2.8 is now available and fixes a lot of issues 🥳 !
If you're tempted to give WHAD a try, just follow the installation procedure 👉 https://whad.readthedocs.io/en/latest/install.html
Documentation and examples available on https://whad.readthedocs.io/en/latest/index.html