This repository contains Python code developed as part of my master thesis research on jamming techniques for drone communication systems. The work explores countermeasure systems using Software Defined Radio (SDR) technology. It includes implementations for disrupting radio control and video links of commercial UAVs.
☆17Dec 7, 2024Updated last year
Alternatives and similar repositories for UAV-Jamming-Scrips
Users that are interested in UAV-Jamming-Scrips are comparing it to the libraries listed below
Sorting:
- CIPSEC SDR Jammer Detector☆17Jun 11, 2019Updated 6 years ago
- A jamming-and-replay attack using SDR☆18Feb 25, 2019Updated 7 years ago
- Apps related with GPS receiver and jamming☆21Nov 10, 2022Updated 3 years ago
- HackRF / RTLSDR Spectrum Scanning Interface (WIP)☆29Aug 18, 2016Updated 9 years ago
- Deep learning techniques for 5G NR and 4G LTE signal detection and identification☆15Jun 12, 2025Updated 8 months ago
- ESP32-S3-driven MP3 player that marries vintage style with modern tech. It sports a 1.14" TFT LCD for easy navigation and a WM8978 DAC fo…☆13Jan 3, 2025Updated last year
- A tool that can read the commands off an NFC reader using an RTL-SDR☆44Jan 15, 2018Updated 8 years ago
- ☆35Jun 26, 2014Updated 11 years ago
- Its the programmed ATM card that can hack into all ATM machines. Its works with any currency and in any country where you might be living…☆10May 15, 2016Updated 9 years ago
- A USB RubberDucky payload that steals Wi-Fi credentials and sends them to the attacker via STMP☆10Dec 16, 2021Updated 4 years ago
- A scanning FLEX decoder for the HackRF based on gr-pager☆34Oct 8, 2013Updated 12 years ago
- Magnetic card spoofer☆12May 5, 2014Updated 11 years ago
- emv software clone datas DUMPS from original card holder to chip blank card jcop any new generation blank card☆15Oct 25, 2017Updated 8 years ago
- Code for the Arduino-based BadUSB inspired from the legendary Rubber Ducky from Hak5☆11Feb 28, 2023Updated 3 years ago
- MagTool is software for magnetic stripe readers & writers.☆15Jan 22, 2013Updated 13 years ago
- Samy Kamkar's Magspoof using SMD components☆16Dec 1, 2015Updated 10 years ago
- Module PMKIDAttack for WiFi Pineapple☆12Oct 6, 2022Updated 3 years ago
- Schematics & Firmware for self-tuning portable RF Jammer☆11Feb 2, 2018Updated 8 years ago
- Infrared based vein finder.☆12Oct 9, 2018Updated 7 years ago
- Inject scripted keystrokes and mouse movements into remote desktop sessions, including VMware View, Amazon Workspaces, and Microsoft RDP.…☆16Jul 25, 2014Updated 11 years ago
- TV transmitter and receiver through RTL-SDR, for educational purposes☆11Oct 27, 2017Updated 8 years ago
- PillDucky is similar to "Hak5's Rubber Ducky" but for STM32 boards.☆15Jul 27, 2021Updated 4 years ago
- This is a place for everything UK related☆10Feb 1, 2023Updated 3 years ago
- Deep learning-based audio spoofing attack detection experiments for speaker verification.☆14Apr 20, 2023Updated 2 years ago
- Keychain USB multiple password manager/generator/injector☆11Dec 7, 2015Updated 10 years ago
- Helper library to read out the current balance of canteen cards using NFC.☆12Oct 14, 2024Updated last year
- Beta Version of Cryptographic Fault Diagnosis Tool (VerFI)☆13Nov 6, 2020Updated 5 years ago
- ESP32 based LoRa transmitter that uses a DHT22 sensor to measure temperature and transmit the measurement via LoRa.☆11Jun 9, 2021Updated 4 years ago
- ☆11Jan 1, 2025Updated last year
- NFC Card Data Reader (Android)☆11Apr 30, 2014Updated 11 years ago
- Open source toolchain to compile code for the Sony SmartWatch the "Arduino" way. This toolchain was created as a proof of concept that it…☆23Jun 29, 2013Updated 12 years ago
- this android application detects the fake towers(base stations)☆10Oct 5, 2017Updated 8 years ago
- Teensy code to brute force a keylogger's unlock code☆15Sep 5, 2016Updated 9 years ago
- ESP32 and CC1101 device that continuously opens a Tesla charging port.☆16Oct 18, 2024Updated last year
- Boscloner - All in One RFID Cloning Toolkit☆16Apr 14, 2017Updated 8 years ago
- PlutoSDR BSP build system based on buildroot☆10Sep 19, 2017Updated 8 years ago
- Simple IIO FM Radio receive example☆16Updated this week
- Evil maid attacks are the biggest threat to full disk encryption, if you can't provide 100% physical security. It's not about locking you…☆11Sep 4, 2016Updated 9 years ago
- ☆13Jan 20, 2017Updated 9 years ago