{"id":13405673,"url":"https://github.com/jopohl/urh","last_synced_at":"2025-05-12T05:27:28.347Z","repository":{"id":37251739,"uuid":"55258005","full_name":"jopohl/urh","owner":"jopohl","description":"Universal Radio Hacker: Investigate Wireless Protocols Like A Boss","archived":false,"fork":false,"pushed_at":"2025-01-24T10:53:05.000Z","size":55825,"stargazers_count":11498,"open_issues_count":50,"forks_count":909,"subscribers_count":439,"default_branch":"master","last_synced_at":"2025-05-12T02:42:10.119Z","etag":null,"topics":["airspy","bladerf","hacking","hackrf","iot","limesdr","python","qt","radio","rtl-sdr","sdr","sdrplay","security","usrp","wireless"],"latest_commit_sha":null,"homepage":"","language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"gpl-3.0","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/jopohl.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":".github/FUNDING.yml","license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null},"funding":{"github":null,"patreon":null,"open_collective":null,"ko_fi":null,"tidelift":null,"community_bridge":null,"liberapay":null,"issuehunt":null,"otechie":null,"custom":["https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick\u0026hosted_button_id=6WDFF59DL56Z2"]}},"created_at":"2016-04-01T19:43:07.000Z","updated_at":"2025-05-11T15:42:13.000Z","dependencies_parsed_at":"2023-11-10T15:25:09.567Z","dependency_job_id":"e7f78a71-ce74-4c8b-b126-f9c091d1a7df","html_url":"https://github.com/jopohl/urh","commit_stats":{"total_commits":2843,"total_committers":29,"mean_commits":98.03448275862068,"dds":0.08125219838199083,"last_synced_commit":"544efd35ac4e0105cb63a31f2dc209c3834bc7bd"},"previous_names":[],"tags_count":95,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/jopohl%2Furh","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/jopohl%2Furh/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/jopohl%2Furh/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/jopohl%2Furh/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/jopohl","download_url":"https://codeload.github.com/jopohl/urh/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":253672701,"owners_count":21945480,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["airspy","bladerf","hacking","hackrf","iot","limesdr","python","qt","radio","rtl-sdr","sdr","sdrplay","security","usrp","wireless"],"created_at":"2024-07-30T19:02:08.066Z","updated_at":"2025-05-12T05:27:28.307Z","avatar_url":"https://github.com/jopohl.png","language":"Python","readme":"![URH image](https://raw.githubusercontent.com/jopohl/urh/master/data/icons/banner.png)\n\n[![CI](https://github.com/jopohl/urh/actions/workflows/ci.yml/badge.svg)](https://github.com/jopohl/urh/actions/workflows/ci.yml)\n[![Code style: black](https://img.shields.io/badge/code%20style-black-black)](https://github.com/psf/black)\n[![PyPI version](https://badge.fury.io/py/urh.svg)](https://badge.fury.io/py/urh)\n[![Packaging status](https://repology.org/badge/tiny-repos/urh.svg)](https://repology.org/project/urh/versions)\n [![Blackhat Arsenal 2017](https://rawgit.com/toolswatch/badges/master/arsenal/usa/2017.svg)](http://www.toolswatch.org/2017/06/the-black-hat-arsenal-usa-2017-phenomenal-line-up-announced/)\n [![Blackhat Arsenal 2018](https://rawgit.com/toolswatch/badges/master/arsenal/europe/2018.svg)](http://www.toolswatch.org/2018/09/black-hat-arsenal-europe-2018-lineup-announced/)\n\n\nThe Universal Radio Hacker (URH) is a complete suite for wireless protocol investigation with native support for [many](https://github.com/jopohl/urh/wiki/Supported-devices) common __Software Defined Radios__.\nURH allows __easy demodulation__ of signals combined with an [automatic](https://dl.acm.org/doi/10.1145/3375894.3375896) detection of modulation parameters making it a breeze to identify the bits and bytes that fly over the air. \nAs data often gets _encoded_ before transmission, URH offers __customizable decodings__ to crack even sophisticated encodings like CC1101 data whitening.\nWhen it comes to __protocol reverse-engineering__, URH is helpful in two ways. You can either manually assign protocol fields and message types or let URH __automatically infer protocol fields__ with a [rule-based intelligence](https://www.usenix.org/conference/woot19/presentation/pohl).\nFinally, URH entails a __fuzzing component__ aimed at stateless protocols and a __simulation environment__ for stateful attacks.\n\n### Getting started\nIn order to get started\n - view the [installation instructions](#Installation) on this page,\n - download the [official userguide (PDF)](https://github.com/jopohl/urh/releases/download/v2.0.0/userguide.pdf), \n - watch the [demonstration videos (YouTube)](https://www.youtube.com/watch?v=kuubkTDAxwA\u0026index=1\u0026list=PLlKjreY6G-1EKKBs9sucMdk8PwzcFuIPB),\n - check out the [wiki](https://github.com/jopohl/urh/wiki) for more information such as supported devices or\n - read some [articles about URH](#Articles) for inspiration.\n\nIf you like URH, please :star: this repository and [join our Slack channel](https://join.slack.com/t/stralsundsecurity/shared_invite/enQtMjEwOTIxNzMzODc3LTk3NmE4MGVjYjEyYTMzYTdmN2RlNzUzYzg0NTNjNTQ2ODBkMzI3MDZlOWY3MjE4YjBkNTM4ZjJlNTJlZmJhNDg). We appreciate your support!\n\n### Citing URH\nWe encourage researchers working with URH to cite [this](https://www.usenix.org/conference/woot18/presentation/pohl) WOOT'18 paper or directly use the following BibTeX entry.\n \n \u003cdetails\u003e\n \u003csummary\u003e \u003cb\u003eURH BibTeX entry for your research paper\u003c/b\u003e \u003c/summary\u003e\n \n  ```bibtex\n@inproceedings {220562,\nauthor = {Johannes Pohl and Andreas Noack},\ntitle = {Universal Radio Hacker: A Suite for Analyzing and Attacking Stateful Wireless Protocols},\nbooktitle = {12th {USENIX} Workshop on Offensive Technologies ({WOOT} 18)},\nyear = {2018},\naddress = {Baltimore, MD},\nurl = {https://www.usenix.org/conference/woot18/presentation/pohl},\npublisher = {{USENIX} Association},\n}\n```\n\n \u003c/details\u003e \n\n## Installation\nURH runs on Windows, Linux and macOS. See below for OS specific installation instructions.\n\n### Windows\n On Windows, URH can be installed with its [Installer](https://github.com/jopohl/urh/releases). No further dependencies are required.\n \nIf you get an error about missing ```api-ms-win-crt-runtime-l1-1-0.dll```, run Windows Update or directly install [KB2999226](https://support.microsoft.com/en-us/help/2999226/update-for-universal-c-runtime-in-windows).\n\n### Linux\n#### Installation with pipx\nURH is available on [PyPi](https://pypi.org/project/urh/) so you can install it, for example, with [pipx](https://pypa.github.io/pipx/): \n```bash \npipx install urh\n``` \nThis is the recommended way to install URH on Linux because it comes with __all native extensions__ precompiled.\n\nIn order to access your SDR as non-root user, install the according __udev rules__. You can find them [in the wiki](https://github.com/jopohl/urh/wiki/SDR-udev-rules).\n\n#### Install via Package Manager\nURH is included in the repositories of many linux distributions such as __Arch Linux__, __Gentoo__, __Fedora__, __openSUSE__ or __NixOS__. There is also a package for __FreeBSD__.  If available, simply use your package manager to install URH.\n\n__Note__: For native support, you must install the according ```-dev``` package(s) of your SDR(s) such as ```hackrf-dev``` __before__ installing URH.\n\n#### Docker Images\nThe official URH docker image is available [here](https://hub.docker.com/r/jopohl/urh/). It has all native backends included and ready to operate.\n\n### macOS\n#### Using DMG\n\nIt is recommended to use __at least macOS 13__ when using the DMG available [here](https://github.com/jopohl/urh/releases).\n\n#### With brew\nURH is available as a [homebrew formula](https://formulae.brew.sh/formula/urh) so you can install it with\n```commandline\nbrew install urh\n```\n\n### Running from source (OS-agnostic)\n#### Without installation\n\nTo execute the Universal Radio Hacker without installation, just run:\n```commandline\ngit clone https://github.com/jopohl/urh/\ncd urh/src/urh\n./main.py\n```\n\nNote, before first usage the C++ extensions will be built.\n\n#### Installing from source\n\nTo install URH from source you need to have ```python-setuptools``` installed. You can get them with ```python3 -m pip install setuptools```. \nOnce the setuptools are installed execute: \n```commandline\ngit clone https://github.com/jopohl/urh/\ncd urh\npython setup.py install\n```\n\nAnd start the application by typing ```urh``` in a terminal.\n\n\n## Articles\n### Hacking stuff with URH\n* [Hacking Burger Pagers](https://www.rtl-sdr.com/using-a-hackrf-to-reverse-engineer-and-control-restaurant-pagers/)\n* [Reverse-engineer and Clone a Remote Control](https://www.rtl-sdr.com/video-tutorial-using-universal-radio-hacker-an-rtl-sdr-and-a-microcontroller-to-clone-433-mhz-remotes/)\n* [Reverse-engineering Weather Station RF Signals](https://www.rtl-sdr.com/tag/universal-radio-hacker/)\n* [Reverse-engineering Wireless Blinds](https://www.rtl-sdr.com/reverse-engineering-wireless-blinds-with-an-rtl-sdr-and-controlling-them-with-amazon-alexa/)\n* [Attacking Logitech Wireless Presenters (German Article)](https://www.heise.de/security/meldung/Wireless-Presenter-von-Logitech-und-Inateck-anfaellig-fuer-Angriffe-ueber-Funk-4439795.html)\n* [Attacking Wireless Keyboards](https://threatpost.com/fujitsu-wireless-keyboard-unpatched-flaws/149477/)\n* [Reverse-engineering a 433MHz Remote-controlled Power Socket for use with Arduino](http://www.ignorantofthings.com/2018/11/reverse-engineering-433mhz-remote.html)\n\n### General presentations and tutorials on URH\n* [Hackaday Article](https://hackaday.com/2017/02/23/universal-radio-hacker/)\n* [RTL-SDR.com Article](https://www.rtl-sdr.com/reverse-engineering-signals-universal-radio-hacker-software/)\n* [Short Tutorial on URH with LimeSDR Mini](https://www.crowdsupply.com/lime-micro/limesdr-mini/updates/investigating-wireless-protocols-with-universal-radio-hacker)\n* [Brute-forcing a RF Device: a Step-by-step Guide](https://pandwarf.com/news/brute-forcing-a-new-device-a-step-by-step-guide/)\n* [Hacking wireless sockets like a NOOB](https://olof-astrand.medium.com/hacking-wireless-sockets-like-a-noob-b57d4b4812d5)\n\n## External decodings\nSee [wiki](https://github.com/jopohl/urh/wiki/External-decodings) for a list of external decodings provided by our community! Thanks for that!\n\n## Screenshots\n### Get the data out of raw signals\n![Interpretation phase](http://i.imgur.com/Wy17Zv3.png)\n\n### Keep an overview even on complex protocols\n ![Analysis phase](http://i.imgur.com/ubAL3pE.png)\n\n### Record and send signals\n ![Record](http://i.imgur.com/BfQpg23.png)\n","funding_links":["https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick\u0026hosted_button_id=6WDFF59DL56Z2"],"categories":["Python","\u003ca id=\"tag-dev\" href=\"#tag-dev\"\u003eDev\u003c/a\u003e","Python (1887)","\u003ca id=\"1233584261c0cd5224b6e90a98cc9a94\"\u003e\u003c/a\u003e渗透\u0026\u0026offensive\u0026\u0026渗透框架\u0026\u0026后渗透框架","\u003ca id=\"d4efda1853b2cb0909727188116a2a8c\"\u003e\u003c/a\u003e未分类-WiFi","Software","Networking","Other SDR Software","Awesome SDR Projects"],"sub_categories":["\u003ca id=\"tag-dev.security\" href=\"#tag-dev.security\"\u003eSecurity\u003c/a\u003e","\u003ca id=\"39931e776c23e80229368dfc6fd54770\"\u003e\u003c/a\u003e无线\u0026\u0026WiFi\u0026\u0026AP\u0026\u0026802.11","\u003ca id=\"37ca6907aa42dfd32db5973ff9eec83d\"\u003e\u003c/a\u003e新添加的","CTS used","Development Kit (GUI based)"],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fjopohl%2Furh","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fjopohl%2Furh","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fjopohl%2Furh/lists"}