{"id":13469253,"url":"https://github.com/dhondta/dronesploit","last_synced_at":"2025-05-14T03:10:37.694Z","repository":{"id":41606492,"uuid":"207086727","full_name":"dhondta/dronesploit","owner":"dhondta","description":"Drone pentesting framework console","archived":false,"fork":false,"pushed_at":"2024-11-23T13:13:00.000Z","size":4896,"stargazers_count":1518,"open_issues_count":1,"forks_count":252,"subscribers_count":54,"default_branch":"main","last_synced_at":"2025-04-12T19:43:04.561Z","etag":null,"topics":["cli","console","drone","hacking","pentest-tools","python","security-tools","tinyscript"],"latest_commit_sha":null,"homepage":"","language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"gpl-3.0","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/dhondta.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2019-09-08T08:59:37.000Z","updated_at":"2025-04-11T00:05:38.000Z","dependencies_parsed_at":"2024-01-07T09:37:59.768Z","dependency_job_id":"a360c976-2b95-412e-af7a-0b0d19f6d8b6","html_url":"https://github.com/dhondta/dronesploit","commit_stats":{"total_commits":92,"total_committers":2,"mean_commits":46.0,"dds":"0.021739130434782594","last_synced_commit":"88a4e0b2094b9b80a6fa8cc34497a1004e898a9d"},"previous_names":[],"tags_count":1,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/dhondta%2Fdronesploit","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/dhondta%2Fdronesploit/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/dhondta%2Fdronesploit/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/dhondta%2Fdronesploit/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/dhondta","download_url":"https://codeload.github.com/dhondta/dronesploit/tar.gz/refs/heads/main","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":254059512,"owners_count":22007769,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["cli","console","drone","hacking","pentest-tools","python","security-tools","tinyscript"],"created_at":"2024-07-31T15:01:30.819Z","updated_at":"2025-05-14T03:10:32.684Z","avatar_url":"https://github.com/dhondta.png","language":"Python","readme":"\u003cp align=\"center\"\u003e\u003cimg src=\"https://github.com/dhondta/dronesploit/raw/main/docs/pages/img/logo.png\"\u003e\u003c/p\u003e\n\u003ch1 align=\"center\"\u003eDroneSploit \u003ca href=\"https://twitter.com/intent/tweet?text=DroneSploit%20-%20Console%20made%20with%20SploitKit%20for%20hacking%20light%20commercial%20drones.%0D%0Ahttps%3a%2f%2fgithub%2ecom%2fdhondta%2fdronesploit%0D%0A\u0026hashtags=python,console,sploitkit,dronehacking,dronepentesting\"\u003e\u003cimg src=\"https://img.shields.io/badge/Tweet--lightgrey?logo=twitter\u0026style=social\" alt=\"Tweet\" height=\"20\"/\u003e\u003c/a\u003e\u003c/h1\u003e\n\u003ch3 align=\"center\"\u003eEasily pentest drones.\u003c/h3\u003e\n\n[![PyPi](https://img.shields.io/pypi/v/dronesploit.svg)](https://pypi.python.org/pypi/dronesploit/)\n[![Read The Docs](https://readthedocs.org/projects/dronesploit/badge/?version=latest)](https://dronesploit.readthedocs.io/en/latest/?badge=latest)\n[![Python Versions](https://img.shields.io/pypi/pyversions/dronesploit.svg)](https://pypi.python.org/pypi/dronesploit/)\n[![Known Vulnerabilities](https://snyk.io/test/github/dhondta/dronesploit/badge.svg?targetFile=requirements.txt)](https://snyk.io/test/github/dhondta/dronesploit?targetFile=requirements.txt)\n[![DOI](https://zenodo.org/badge/207086727.svg)](https://zenodo.org/badge/latestdoi/207086727)\n[![Black Hat Arsenal Europe 2019](https://raw.githubusercontent.com/toolswatch/badges/master/arsenal/europe/2019.svg?sanitize=true)](https://www.blackhat.com/eu-19/arsenal/schedule/index.html#drone-hacking-with-dronesploit-18217)\n[![License](https://img.shields.io/badge/license-AGPL%20v3-lightgrey.svg)](https://github.com/dhondta/dronesploit/blob/main/LICENSE)\n[![Contribution](https://img.shields.io/badge/contributions-welcome-brightgreen.svg?style=flat)](https://dronesploit.readthedocs.io/en/latest/newmodules.html#new-modules)\n\n\nThis CLI framework is based on [`sploitkit`](https://github.com/dhondta/python-sploitkit/) and is an attempt to gather hacking techniques and exploits especially focused on **drone hacking**. For the ease of use, the interface has a layout that looks like Metasploit.\n\n```sh\npip3 install dronesploit\n```\n\n\u003e :warning: When starting up the framework, you may have every modules **disabled**. You can see why by using the `show issues` command. Modules are disabled when they have unsatisfied requirements, i.e. `aircrack-ng` not installed.\n\n## :notebook_with_decorative_cover: Documentation\n\n- [Black Hat Europe Arsenal 2019 presentation](https://raw.githubusercontent.com/dhondta/dronesploit/main/docs/pages/blackhat-eu19-arsenal.pdf)\n- [*Black Hat Europe: New tool offers Metasploit-like framework for hacking into drones*, The Daily Swig](https://portswigger.net/daily-swig/black-hat-europe-new-tool-offers-metasploit-like-framework-for-hacking-into-drones)\n- [*Dronesploit, a pentesting console framework dedicated to drones*, Hakin9](https://hakin9.org/dronesploit-a-pentesting-console-framework-dedicated-to-drones/)\n\n\n## :clipboard: Basics\n\n### Interface\n\n\u003cp align=\"center\"\u003e\u003cimg src=\"https://github.com/dhondta/dronesploit/raw/main/docs/pages/img/dronesploit.png\"\u003e\u003c/p\u003e\n\u003cp align=\"center\"\u003e\u003cimg src=\"https://github.com/dhondta/dronesploit/raw/main/docs/pages/img/dronesploit-commands.png\"\u003e\u003c/p\u003e\n\n### Modules\n\nThis example shows an example of module for DroneSploit aimed to change the password or the SSID of a particular model of drone.\n\n\u003cp align=\"center\"\u003e\u003cimg src=\"https://github.com/dhondta/dronesploit/raw/main/docs/pages/img/dronesploit-module.png\"\u003e\u003c/p\u003e\n\n\n## :clap:  Supporters\n\n[![Stargazers repo roster for @dhondta/dronesploit](https://reporoster.com/stars/dark/dhondta/dronesploit)](https://github.com/dhondta/dronesploit/stargazers)\n\n[![Forkers repo roster for @dhondta/dronesploit](https://reporoster.com/forks/dark/dhondta/dronesploit)](https://github.com/dhondta/dronesploit/network/members)\n\n\u003cp align=\"center\"\u003e\u003ca href=\"#\"\u003e\u003cimg src=\"https://img.shields.io/badge/Back%20to%20top--lightgrey?style=social\" alt=\"Back to top\" height=\"20\"/\u003e\u003c/a\u003e\u003c/p\u003e\n","funding_links":[],"categories":["Python","Python (1887)",":wrench: Tools","Pentesting"],"sub_categories":["Scientific Research","ARM"],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fdhondta%2Fdronesploit","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fdhondta%2Fdronesploit","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fdhondta%2Fdronesploit/lists"}