Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/mahaloz/disarm
A POC Exploit to disarm open-source drones in your area
https://github.com/mahaloz/disarm
docker mitm px4 sik-radio
Last synced: about 1 month ago
JSON representation
A POC Exploit to disarm open-source drones in your area
- Host: GitHub
- URL: https://github.com/mahaloz/disarm
- Owner: mahaloz
- Created: 2019-04-12T02:31:52.000Z (over 5 years ago)
- Default Branch: master
- Last Pushed: 2019-06-08T06:19:17.000Z (over 5 years ago)
- Last Synced: 2024-10-14T11:03:08.900Z (3 months ago)
- Topics: docker, mitm, px4, sik-radio
- Language: C
- Homepage:
- Size: 478 KB
- Stars: 4
- Watchers: 2
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# Drone Identification Signal And Retargeting Mimicker
Drone Identification Signal And Retargeting Mimicker (DISARM) is a small software package for interacting with SiK radios to disarm rouge drones.## About
DISARM is based on the concept of mimicking ID codes in the Mavlink communication protocol to take arbitrary control on nearby drone.
This project was a direct product of the SES494: Autonomous Exploration Systems class, from which [Jnaneshwar Das](https://github.com/darknight-007) mentored the process of this project. Also big thanks to [Harish Anand](https://github.com/harishanand95) for helping me out with drone semantics.## Requirements
To use this software package you will need to purchase a [SiK Radio](https://docs.px4.io/en/telemetry/sik_radio.html), which can be purchased at multiple locations online.
On the software side you will need [Docker](https://docs.docker.com/v17.12/install/) and a `Unix` based system like `MacOs` or `Linux`. Though this project is dockerized, it requires access to the `/dev/` directory so DISARM can automatically interact with your SiK radio.## Installation
Once you have `Docker` downloaded, you may need to use `sudo`, use this command to pull the image:
```bash
docker pull mahaloz/disarm
```## Usage
Run this to launch the DISARM system:
```bash
docker run -it --rm -v /dev/:/dev/ mahaloz/disarm
```
Now plug the SiK radio into any available usb port.
Finnaly run this to start disarming any system in the area:
```bash
./start_disarming
```## Todo
* Add a modify Firmware section
* Look into MavLink2 Signing
* lol the usage does not work correctly for disarming