Johannes Pohl is an independent research engineer whose open-source work focuses on the security analysis of proprietary radio systems. His flagship release, Universal Radio Hacker, consolidates the entire workflow of wireless protocol investigation into one extensible environment: live capture with integrated drivers for popular SDR front-ends such as RTL-SDR, HackRF, LimeSDR and USRP; bit-level demodulation that automatically detects ASK, FSK and PSK variants; a graphical rule builder for packet structure dissection; programmable fuzzing and replay modules for stress-testing IoT and remote-keyless devices; and a statistical suite that compares traces to expose weak entropy or missing encryption. Typical use cases range from academic side-channel analysis and red-team RF assessments to hobbyist exploration of weather stations, garage remotes and drone controllers, all without requiring bespoke hardware beyond an inexpensive dongle. The tool exports to common formats for further inspection in GNU Radio or MATLAB, while Python scripting hooks let researchers integrate custom decoders or automate capture campaigns. Because the project is actively maintained on GitHub, new demodulators and device profiles appear regularly, keeping the laboratory toolkit aligned with evolving commercial protocols. Johannes Pohl’s software is available for free on get.nero.com, where downloads are delivered through trusted Windows package sources such as winget, always installing the latest version and permitting batch installation alongside other applications.

Universal Radio Hacker

a complete suite for wireless protocol investigation with native support for many common Software Defined Radios.

Details