Multi-platform wireless security analysis and documentation for penetration testers, security engineers, and network auditors.
A complete workflow from passive discovery through tamper-evident documentation — every step designed for the field.
Scan nearby Wi-Fi and Bluetooth. Full AP profiling with signal strength, security type, vendor ID, and real-time risk scoring.
Deep profile any network or device. CVE matching, evil twin detection, historical sightings, and security posture assessment.
Test connectivity end-to-end. DHCP, DNS integrity, captive portal detection, latency, and TLS interception checks.
Connected network security analysis. Routing, DNS, local device discovery, and risk assessment from inside the network.
Automated risk scoring with CVE intelligence. Evil twin and rogue AP detection, baseline drift, and CISA KEV cross-referencing.
Permanent, tamper-evident field records. GPS-tagged, searchable, exportable with SHA-256 integrity and chain of custody.
Three steps. One tool. Every finding documented with cryptographic integrity before you leave the site.
Arrive on site and start a passive scan. TraceWaves discovers every wireless signal in range — Wi-Fi, Bluetooth, and BLE — in seconds.
Automatic risk scoring, CVE matching, evil twin detection, and vendor identification. Every finding is ranked and contextualized.
One tap to create a GPS-tagged, SHA-256 hashed journal entry. Export as PDF, JSON, or CSV. Evidence that holds up.
Sync between devices, work offline, and pick up exactly where you left off.
→ Beta access available now
See what your wireless environment really looks like.