Drone Identification Signal And Retargeting Mimicker (DISARM) is a small software package for interacting with SiK radios to disarm rouge drones.
DISARM is based on the concept of mimicking ID codes in the Mavlink communication protocol to take arbitrary control on nearby drone. This project was a direct product of the SES494: Autonomous Exploration Systems class, from which Jnaneshwar Das mentored the process of this project. Also big thanks to Harish Anand for helping me out with drone semantics.
To use this software package you will need to purchase a SiK Radio, which can be purchased at multiple locations online.
On the software side you will need Docker and a Unix based system like MacOs or Linux. Though this project is dockerized, it requires access to the /dev/ directory so DISARM can automatically interact with your SiK radio.
Once you have Docker downloaded, you may need to use sudo, use this command to pull the image:
docker pull mahaloz/disarm Run this to launch the DISARM system:
docker run -it --rm -v /dev/:/dev/ mahaloz/disarm Now plug the SiK radio into any available usb port. Finnaly run this to start disarming any system in the area:
./start_disarming- Add a modify Firmware section
- Look into MavLink2 Signing
- lol the usage does not work correctly for disarming