RemoteIDSpoofer

Drone simulator

A device that simulates RemoteID signals from multiple drones

NodeMCU RemoteID Spoofer

GitHub

375 stars
28 watching
74 forks
Language: C
last commit: 4 months ago
Linked from 1 awesome list


Backlinks from these awesome lists:

Related projects:

Repository Description Stars
rub-syssec/dronesecurity A receiver for DJI's Drone-ID protocol designed to decode and analyze drone security data 1,007
jjschwartz/networkattacksimulator An environment for testing AI agents against a simulated network 171
dhondta/dronesploit A framework providing a Metasploit-like interface for hacking into drones and other devices 1,450
qchackers/jquil A Java library for running quantum circuits on Rigetti Forest's cloud-based quantum computer. 16
ardupilot/arduremoteid A remote identification transmitter solution for drones complying with FAA and EU regulations 103
poshaughnessy/web-bluetooth-parrot-drone An open source web application that controls a Parrot Mini Drone using Web Bluetooth. 95
jawj/pigeonsim An interactive flight simulation that translates user arm movements into in-game actions using sensor data and WebSockets. 19
ibm-cloud/parrot-sample Sample code for controlling a Parrot AR Drone or Bebop using MQTT and the IBM IoT Foundation. 18
ethz-asl/rotors_simulator A simulator for multirotor drones in a virtual environment. 1,271
lis-epfl/swarmlab A Matlab package for simulating drones and swarms of drones in various environments 225
quii/mockingjay-server Provides a tool to create fast-to-launch fake servers with configurable contracts and testing capabilities. 560
provos/honeyd A tool for creating and managing synthetic network hosts to simulate various network conditions and test security systems. 11
datasoft/honeyd Creates virtual hosts on a network with customizable services and TCP personality. 351
px4/jmavsim A multirotor simulator with MAVLink protocol support for flight simulation and testing 89
inguardians/toms_honeypot A Python-based project simulating a decoy system to detect and analyze malicious activity in computer networks. 26