ReCAN
CAN decoder
Extracts and decodes data from Controller Area Networks
ReCAN Source - Reverse engineering of Controller Area Networks - In collaboration with the Politecnico di Milano, Italy
38 stars
3 watching
10 forks
Language: Jupyter Notebook
last commit: almost 5 years ago
Linked from 1 awesome list
automotivecan-buscontroller-area-networkmachine-learning
Related projects:
Repository | Description | Stars |
---|---|---|
| A C library to encode and decode CAN (Controller Area Network) signals used in automotive applications. | 22 |
| Automates reconnaissance and service enumeration of network hosts to gather information and write recommendations for further testing. | 2,124 |
| Tools and software for accessing and decoding data from automotive CAN bus networks | 550 |
| Decodes and visualizes radar data from China's New Generation Weather Radar system. | 376 |
| A Python API for controlling car electronics, particularly steering, gas, and brakes. | 2,002 |
| A Caffe-based implementation of A-Fast-RCNN, a method for object detection using adversarial networks. | 482 |
| A microPython library for interacting with CAN Bus controllers. | 4 |
| Analyzes data from industrial vehicle communication networks | 23 |
| A C library for simulating CAN bus communication without physical devices. | 15 |
| Automates OSINT analysis of IP addresses and hashes by querying multiple data sources | 535 |
| A tool for reverse engineering systems using CAN bus communications | 78 |
| Decodes raw CAN bus data into physical values using decoding rules stored in DBC files | 75 |
| A CAN bus traffic analyzer with a custom protocol over a USB serial port emulation | 21 |
| An Active Directory reconnaissance tool that uses ADSI and reflective DLLs to enumerate domain information and query user, group, and computer objects. | 316 |
| A tool to securely analyze and transfer data from compromised USB keys to trusted devices. | 455 |