Ready to get started?
A part of BTstack is immediately available in source code and free for evaluation and non-commercial-use. Whether you are interested in running your application on a Bluetooth SoC like ESP32, barebones on a regular microcontroller or on top of an an RTOS like FreeRTOS or Zephyr, the easiest way to try BTstack is on a regular desktop setup like Mac OS, Linux or Windows together with a standard USB Bluetooth dongle. Running BTstack on desktop speeds up the development cycle and provides direct access to the packet log files in case something doesn't work as expected. The same code can then run unmodified on an embedded target later.
- Microcontrollers with or without RTOS
- Embedded Linux systems
- Desktop: Windows, MacOS, Linux
Industries: Secure appliances, Automotive accessories, Navigation, Fitness, Medical devices, Logistics, Unicast and Auracastâ„¢ audio wireless infrastructure and more.
Why Choose Our BTstack?
BTstack is a flexible, compact and fast Bluetooth stack written in C99. It was created as a result of extensive academic and industrial experience with different solutions dating back to 2001. BlueKitchen GmbH was founded in 2012 to continue the development of an independent Host stack alternative.
As a state-of-the-art dual-mode Bluetooth stack, it is embedded today in millions of devices, with users ranging from hobbyists and security researchers, over OEMs, to Bluetooth Controller vendors and Bluetooth IP providers.
Partners
Through our partnerships we provide joint customer solutions and drive new business opportunities.



Clients
BTstack is in use by various companies and successfully employed in a wide range of products.
















Engelstrasse 9
8004 Zurich
Switzerland
BlueKitchen Blog
Here you'll find our experiences of porting BTstack to different platforms, the issues we encountered along the road, Bluetooth news, as well as details from more challenging BTstack projects, some of which require reverse engineering.

USB Adapter for Intel Bluetooth/Wifi M.2 Cards

BLUFFS: Impersonating BR/EDR Devices Using Fixed Weak Session Encryption Key
