Skip to content

mahaloz/DISARM

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

16 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Drone Identification Signal And Retargeting Mimicker

Drone Identification Signal And Retargeting Mimicker (DISARM) is a small software package for interacting with SiK radios to disarm rouge drones.

About

DISARM is based on the concept of mimicking ID codes in the Mavlink communication protocol to take arbitrary control on nearby drone. This project was a direct product of the SES494: Autonomous Exploration Systems class, from which Jnaneshwar Das mentored the process of this project. Also big thanks to Harish Anand for helping me out with drone semantics.

Requirements

To use this software package you will need to purchase a SiK Radio, which can be purchased at multiple locations online. On the software side you will need Docker and a Unix based system like MacOs or Linux. Though this project is dockerized, it requires access to the /dev/ directory so DISARM can automatically interact with your SiK radio.

Installation

Once you have Docker downloaded, you may need to use sudo, use this command to pull the image:

docker pull mahaloz/disarm 

Usage

Run this to launch the DISARM system:

docker run -it --rm -v /dev/:/dev/ mahaloz/disarm 

Now plug the SiK radio into any available usb port. Finnaly run this to start disarming any system in the area:

./start_disarming

Todo

  • Add a modify Firmware section
  • Look into MavLink2 Signing
  • lol the usage does not work correctly for disarming

About

A POC Exploit to disarm open-source drones in your area

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors