Khanfar Spectrum Analyzer: Signal Analysis Tools for the RTL-SDR

Thank you to M. Khanfar for submitting news about the release of his new spectrum analyzer, sweeper, and FM Radio demodulator tools for the RTL-SDR. The tools are freely released, however, they do not seem to be open source.

THIRD PARTY SOFTWARE VIRUS WARNING: We just want to note that Khanfar's software shows a few positive results for viruses on VirusTotal. These are most likely false positives, but please use this software at your own risk, especially as it is not open source.

The first tool M. Khanfar is releasing is the Khanfar Full Spectrum RTL-SDR Sweeper tool, a wideband spectrum analyzer for the RTL-SDR. It allows the RTL-SDR to produce a spectrum sweep over a large bandwidth by rapidly re-tuning the frequency and plotting each 2.4 MHz live sweep sequentially. This is the same concept used by previous tools like rtl_power and Spektrum.

Khanfar RTL-SDR Sweeper
Khanfar RTL-SDR Sweeper

The second tool released is the Khanfar Advanced Spectrum Analyzer. This tool allows you to view the live spectrum from an RTL-SDR in various visualization modes.

Khanfar Spectrum Analyzer
Khanfar Spectrum Analyzer

The third tool is Khanfar-FM-Radio, a text-based wideband and narrowband FM demodulator for the RTL-SDR.

Khanfar WFM-NFM Demodulator
Khanfar WFM-NFM Demodulator

M. Khanfar notes that all tools can open multiple instances of themselves, allowing them to be used use multiple RTL-SDR dongles on the same machine.

In the video embedded below, M. Khanfar shows his three software applications in action.

Khanfar Spectrum Analyzer

Subscribe
Notify of
guest

2 Comments
Inline Feedbacks
View all comments
john

Hi , The results you are seeing from VirusTotal indicate that some antivirus engines flagged your executable (.exe) as potentially malicious. This is a common issue when creating executables from Python scripts, especially when using tools like PyInstaller, cx_Freeze, or similar packaging tools. Here’s an explanation of why this happens and how to address it:
Why Antivirus Engines Flag Python Executables
1. **Packing Mechanism**:
  – Tools like PyInstaller bundle your Python code and dependencies into a single executable. This process involves compressing and encrypting parts of the binary, which can resemble techniques used by malware to obfuscate their code.
  – Some antivirus engines may flag such executables as suspicious because they cannot easily analyze the contents.

2. **Generic Heuristic Detection**:
  – Many antivirus engines use heuristic analysis to detect suspicious behavior or patterns. Since Python executables often include large libraries (e.g., PyQt6, NumPy, etc.), these can sometimes trigger false positives.

3. **False Positives**:
  – The detections you listed (e.g., W64.AIDetectMalware, Spy.Win64.Keylogger.oa!s1, Trojan.Disco.Win32.12840) are likely false positives. These names are generic and do not necessarily indicate actual malicious behavior.

4. **Third-Party Dependencies**:
  – If your project includes third-party libraries or binaries (e.g., DLLs, shared objects), some antivirus engines might flag them if they are not commonly seen in other applications.

tremlin

please add more Hardware support for more SDRs like Airspy…