Nzyme v1.0 "Kyle Canyon" has been released

Today, after about 3 years of weekend hacking, I'm happy to announce that nzyme v1.0 "Kyle Canyon" has been released.

The goal of the free and open nzyme project is to provide a complete platform that helps you to defend your wireless networks. Existing WiFi IDS systems fall short and can be easily spoofed, even by not very sophisticated attackers with commoditized attack platforms. Wireless networks open a huge attack vector and exploiting it is easy compared to alternative vectors.

In addition, nzyme ships with out-of-the-box bandit definitions that will detect many attack platforms the moment they are powered on and in range. For example, a WiFi Pineapple or Pwnagotchi will be detected immediately.

A nzyme tracker device can be used to physically locate the source of specific WiFi frames and play a big role in actively defending your perimeter.


The system overview screen and active probes.
The network and channel detail page is useful to detect or investigate anomalies.
Bandit definitions are used to alert on specific threat actors, attack platform and to physically locate the source of WiFi frames using tracker devices.
Nzyme can trigger built-in or custom alerts.
A smartphone connected to a nzyme tracker device. You can use tracker devices to physically locate the source of WiFi frames.
A purpose-built nzyme tracker device.

Update 3/21/21: Some questions about the tracker and their LoRa format came in. I'd like to clarify that trackers are an advanced concept and that LoRa is not required to get started with nzmye. Further, a plan to support other protocols (including WiFi) for tracker communications is already on the roadmap. See this GitHub ticket for more details.

Alerting Demo

Download Now

The nzyme .DEB and .JAR packages are available on the downloads page. Follow the documentation to get started.