Wireless Reconnaissance Platform

Trace every signal.
Document every site.

Multi-platform wireless security analysis and documentation for penetration testers, security engineers, and network auditors.

tracewaves — scan results
tracewaves scan --passive

# Discovered 14 networks, 23 BT devices

SSID BSSID CH SEC RSSI RISK
CorpNet-5G A4:CF:12:9B:3E:01 36 WPA3 -42 LOW
FreeWiFi DE:AD:BE:EF:CA:FE 6 OPEN -51 MED
CorpNet-5G 00:1A:2B:3C:4D:5E 36 WPA2 -48 HIGH
Printer-HP-4200 B8:27:EB:A1:B2:C3 11 WEP -63 CRIT

⚠ EVIL TWIN DETECTED: CorpNet-5G (mismatched BSSID)
ℹ CVE-2024-30078 matched on Printer-HP-4200 (WEP)

tracewaves journal --tag evil-twin --gps
✓ Entry logged SHA-256: 7f83b1...

6 Analysis Pillars
4 Platforms
SHA-256 Evidence Integrity
CVE Intelligence
GPS Tagged Records

Capabilities

Six pillars of
wireless intelligence

A complete workflow from passive discovery through tamper-evident documentation — every step designed for the field.

Discover

Scan nearby Wi-Fi and Bluetooth. Full AP profiling with signal strength, security type, vendor ID, and real-time risk scoring.

Inspect

Deep profile any network or device. CVE matching, evil twin detection, historical sightings, and security posture assessment.

Verify

Test connectivity end-to-end. DHCP, DNS integrity, captive portal detection, latency, and TLS interception checks.

Analyze

Connected network security analysis. Routing, DNS, local device discovery, and risk assessment from inside the network.

Assess

Automated risk scoring with CVE intelligence. Evil twin and rogue AP detection, baseline drift, and CISA KEV cross-referencing.

Journal

Permanent, tamper-evident field records. GPS-tagged, searchable, exportable with SHA-256 integrity and chain of custody.


Workflow

From scan to evidence

Three steps. One tool. Every finding documented with cryptographic integrity before you leave the site.

01

Scan

Arrive on site and start a passive scan. TraceWaves discovers every wireless signal in range — Wi-Fi, Bluetooth, and BLE — in seconds.

02

Analyze

Automatic risk scoring, CVE matching, evil twin detection, and vendor identification. Every finding is ranked and contextualized.

03

Document

One tap to create a GPS-tagged, SHA-256 hashed journal entry. Export as PDF, JSON, or CSV. Evidence that holds up.


Cross-Platform

One tool. Every platform.

Sync between devices, work offline, and pick up exactly where you left off.

macOS
Windows
iOS
PWA (Chrome & Edge)

→ Beta access available now


Ready to trace the airwaves?

See what your wireless environment really looks like.

Get Started