Skip to content

seedon198/DroneSec-Resources

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 

Repository files navigation

🚁 DroneSec-Resources

Drone Security Offensive Security Research

A comprehensive collection of resources for learning and mastering drone/UAV security, with a strong focus on offensive security techniques including firmware analysis, radio protocols, side-channel attacks, electromagnetic (EM) analysis, and exploitation.

Awesome License: MIT GitHub stars GitHub forks


📋 Table of Contents


🎯 Introduction

This repository is a curated, comprehensive collection of resources for security researchers, penetration testers, and enthusiasts interested in drone/UAV security. The emphasis is on offensive security techniques to understand, exploit, and mitigate vulnerabilities in unmanned aerial systems (UAS).

Why Drone Security?

Rapid Growth Critical Infrastructure Emerging Threats Vulnerability Surface
1.1M+ drones in US Military, Law Enforcement 350+ incursions (2024) RF, GPS, Firmware, EM
$43B market by 2025 Commercial, Civilian Urban Air Mobility Wi-Fi, Bluetooth, MAVLink

Attack Surfaces Overview

graph TD
    A[Drone/UAV] --> B[Wireless Communication]
    A --> C[Hardware Components]
    A --> D[Firmware/Software]
    A --> E[Mobile Apps/Backend]
    
    B --> B1[RF Links]
    B --> B2[GPS/GNSS]
    B --> B3[Wi-Fi/Bluetooth]
    B --> B4[MAVLink Protocol]
    
    C --> C1[Flight Controller]
    C --> C2[Sensors - IMU/GPS]
    C --> C3[Debug Ports - UART/JTAG]
    C --> C4[Side-Channel Leaks]
    
    D --> D1[Firmware Updates]
    D --> D2[Authentication]
    D --> D3[Encryption]
    D --> D4[Backdoors]
    
    E --> E1[Ground Control Station]
    E --> E2[Cloud Services]
    E --> E3[API Vulnerabilities]
    E --> E4[Data Leakage]
Loading

🚀 Getting Started

Prerequisites

Essential Knowledge:

  • Basic electronics and embedded systems
  • Wireless protocols (Wi-Fi, Bluetooth, RF)
  • Linux/Unix command line
  • Python/C++ programming
  • Networking fundamentals

Hardware Setup (Optional but Recommended):

Component Entry Level Intermediate Professional
Test Drone DJI Tello ($100) Parrot Bebop 2 ($200) DJI Mavic 3 ($1500+)
SDR RTL-SDR ($30) HackRF One ($300) USRP ($1000+)
Wi-Fi Alfa AWUS036ACH ($50) Wi-Fi Pineapple ($100) Professional gear
Analysis Laptop + Software Logic Analyzer ($50) ChipWhisperer ($1500)

Quick Start Guide

  1. Start with Fundamentals (1-2 weeks)

  2. Set up Virtual Environment (1 week)

  3. Practice with Tools (2-4 weeks)

    • Wireshark for packet analysis
    • GNU Radio for SDR
    • Ghidra for reverse engineering

📚 Learning Path

Phase 1: Foundation (Weeks 1-4)

Focus: Understanding drone architecture and basic security concepts

  • ✅ Drone components and communication protocols
  • ✅ MAVLink protocol basics
  • ✅ Wireless security fundamentals
  • ✅ Virtual testing environment setup

Resources:

Phase 2: Core Skills (Weeks 5-12)

Focus: Hands-on attack techniques and analysis

  • ✅ Wireless attacks (deauth, MITM)
  • ✅ GPS vulnerabilities and spoofing
  • ✅ Protocol analysis and fuzzing
  • ✅ Firmware extraction and analysis

Resources:

Phase 3: Advanced Techniques (Weeks 13-24)

Focus: Reverse engineering and advanced exploitation

  • ✅ ARM/MIPS firmware analysis
  • ✅ SDR signal generation and analysis
  • ✅ Advanced GPS spoofing techniques
  • ✅ Exploit development

Phase 4: Specialization (Weeks 25+)

Focus: Research and specialization

  • ✅ Side-channel attacks (power/EM analysis)
  • ✅ RF exploitation and protocol reversing
  • ✅ Original research and bug bounties
  • ✅ Conference presentations and publications

🔒 Core Topics

Drone Architecture & Components

graph LR
    A[Ground Control Station] --> B[Radio Link]
    B --> C[Flight Controller]
    C --> D[ESCs]
    C --> E[Sensors]
    C --> F[Companion Computer]
    
    D --> G[Motors]
    E --> H[IMU]
    E --> I[GPS]
    E --> J[Camera]
    
    F --> K[AI/ML Processing]
    F --> L[Additional Sensors]
Loading

Key Components:

  • Flight Controller (FC): ArduPilot, PX4, DJI proprietary
  • ESCs: Electronic Speed Controllers for motor control
  • Sensors: IMU, GPS, barometer, magnetometer
  • Communication: MAVLink, DroneCAN, proprietary protocols

Communication Protocols

Protocol Frequency Security Use Case
MAVLink Various Basic (v1.0) / Signed (v2.0) Standard drone communication
Wi-Fi 2.4/5.8 GHz WPA2/WPA3 Video streaming, telemetry
Bluetooth 2.4 GHz BLE security Mobile app control
GPS 1.575 GHz None (civilian) Navigation
DJI OcuSync 2.4/5.8 GHz Proprietary DJI drones

Attack Vectors

Wireless Hardware Firmware Applications
RF Jamming/Spoofing Debug Port Access Binary Analysis Mobile App Vulnerabilities
GPS Manipulation Side-Channel Attacks Firmware Modification Cloud Service Exploits
Protocol Hijacking Hardware Trojans Authentication Bypass Network Infrastructure

🛠️ Tools & Frameworks

Penetration Testing Frameworks

Tool Description GitHub Use Case
DroneSploit Metasploit-like framework for drone exploits Link Automated exploitation
Damn Vulnerable Drone Intentionally vulnerable UAV simulation Link Learning environment
Drone Hacking Tool GUI for Wi-Fi/GPS attacks Link User-friendly interface
Firmware Ninja UAV binary reverse engineering Binary Ninja Firmware analysis
DRAT DJI Mavic assessment framework ACM CICSYN 2020 DJI vulnerability assessment
FIMI A3 RE Firmware/camera reverse engineering GitHub FIMI drone analysis
RUB-SysSec/DroneSecurity Open-source frameworks for fuzzing drone protocols GitHub Protocol fuzzing and DroneID decoding
DJI-Firmware-Tools DJI firmware extraction and analysis GitHub DJI firmware unpacking

Additional Offensive Tools

  • Dronesploit Analysis: DroneSec Blog
  • Drone Operation and Demolition Guide: Medium Guide
  • Airspace Mapper: Tool for tracing drone communications

SDR Tools

Hardware Recommendations:

SDR Device Price Frequency Range TX/RX Best For
RTL-SDR v3 $30 24MHz - 1.7GHz RX only Beginners, monitoring
HackRF One $300 1MHz - 6GHz TX/RX General purpose
BladeRF 2.0 $420 47MHz - 6GHz TX/RX Professional use
USRP B200 $1100 70MHz - 6GHz TX/RX Research, development

Software Stack:

  • GNU Radio - Signal processing framework
  • GQRX - Spectrum analyzer
  • SDRangel - Multi-purpose SDR application
  • URH - Universal Radio Hacker

Firmware Analysis Tools

# Firmware extraction
binwalk -e firmware.bin

# Static analysis
ghidra firmware.bin

# Dynamic analysis
qemu-system-arm -M versatilepb -kernel firmware.bin

# Protocol analysis
wireshark capture.pcap

📄 Research Papers & Conference Talks

Comprehensive Resource Table

Type Title Conference/Journal Year Focus Links
Conference Talk Drones Hijacking: Multi-Dimensional Attack Vectors DEF CON 24 2016 Architecture exploits Video | Slides
Conference Talk Practical Aerial Hacking & Surveillance Black Hat/DEF CON 2015 RF interception Video
Conference Talk Hacking Invisibly & Silently with Light & Sound DEF CON 25 2017 Non-RF side-channels Video
Conference Talk Deep Dive: RE & Exploitation of Drones RECON 2023 Firmware/PCB analysis Slides
Conference Talk Running XBOW Live: Drone Pentesting Black Hat/DEF CON 2025 Vulnerability scanning Blog/Slides
Conference Talk Hacking a Professional Drone Black Hat Asia 2016 Commercial UAV exploitation Nils Rodday
Conference Talk Grand Theft Drone – Breaking Drone RF Links Black Hat USA Various Proprietary radio protocols Multiple presentations
Conference Talk Drone Attacks on Industrial Wireless Black Hat USA Various Industrial wireless vulnerabilities Multiple presentations
Conference Talk SkyJack: Autonomous Drone Hacking DEF CON 21 2013 Autonomous hijacking Samy Kamkar
Conference Talk Maldrone: First Malware for Drones DEF CON 23 2015 First drone malware Rahul Sasi
Conference Talk DJI Drone Security: A Hacker's Perspective 47C3 (CCC) 2021 Hardware analysis DJI Mini-series compromise
Research Paper Comprehensive Survey of Security/Privacy in UAV Systems IEEE 2025 Hardware/software/comms attacks IEEE
Research Paper Comprehensive Survey on Anti-UAV Methods arXiv 2025 Detection/offensive benchmarking arXiv
Research Paper Drone Cybersecurity Issues, Solutions, and Trends ACM 2023 Privacy dissection ACM
Research Paper Cyber4Drone: Systematic Review of Security & Forensics MDPI 2023 Threat models/forensics MDPI
Research Paper Secure UAV (Drone) and the Great Promise of AI ACM CSUR 2024 AI/security roadmap ACM CSUR
Research Paper A Security Review in the UAVNet Era ACM CSUR 2022 Threats/countermeasures ACM CSUR
Research Paper A Survey on Security and Privacy Issues of UAVs ScienceDirect 2023 4-level categorization ScienceDirect
Research Paper Surveying Cybersecurity Vulnerabilities... for UAVs Comp Networks 2024 Auth/physical layer Comp Networks
Research Paper Security Vulnerabilities of UAVs... IEEE 2018 DJI Phantom 4 Pro experiments IEEE
Research Paper Unmanned Aircraft Capture... JFR 2014 GPS spoofing JFR
Research Paper On GPS Spoofing... PeerJ CS 2021 Threats/methods PeerJ CS
Research Paper ML in Internet-of-Drones ACM CSUR 2023 IDS ACM CSUR
Research Paper Vuln Analysis of MAVLink DoD/AFIT Various CIA flaws DoD/AFIT
Research Paper Security Analysis of FHSS Drone Controller Various 2016 FHSS vulnerabilities Various
Research Paper Securing Commercial WiFi UAVs IEEE MILCOM 2016 WiFi security IEEE MILCOM
Research Paper Practical GPS Spoofing on Consumer Drones U Hawaii 2020 Hardware/models U Hawaii
Research Paper Implementation-Based GPS Spoofing for UAVs Bahcesehir U 2024 Defenses/HackRF Bahcesehir U
Research Paper Cyber Security Vulns in UAVs KTH 2019 STRIDE/taxonomy KTH
Research Paper Safeguarding UAVs Against Side-Channel Analysis IEEE 2022 Motor noise for key prevention IEEE
Research Paper Side-Channel-Driven IDS for UAVs Various 2024 Leakage detection/fault injection PDF
Research Paper Drone Security and Fault Injection Attacks IOActive 2023 Platform for attacks on commercial UAVs Whitepaper
Research Paper Review of Intentional EM Interference on UAV Sensors MDPI 2022 IEMI on modules MDPI
Research Paper Paralyzing Drones via EMI Signal Injection NDSS 2023 IMU corruption NDSS
Research Paper UAV Identification via EM Emissions ACM 2025 Impersonation ACM
Research Paper Framework for Sensing RF Spectrum Attacks on UAVs IEEE 2020 Jamming/spoofing on GPS/RF IEEE
Research Paper On GPS Spoofing of Aerial Platforms PMC 2021 Threats/countermeasures PMC
Research Paper Framework for Preventing Unauthorized Intrusions ScienceDirect 2024 Jamming vs. spoofing ScienceDirect
Research Paper Reverse Engineering and Retrofitting RAV Controls ACM 2022 Binary patching ACM
Research Paper Challenges in Drone Firmware Analyses (DJI) IEEE 2024 Dynamic methodology IEEE
Research Paper DJI Mavic 3: Firmware Analysis Nozomi 2023 Packer bypass Blog
Industry Report Global Guardian Threat Assessment Various 2025 Espionage/countermeasures Various
Industry Report Nozomi DJI Mavic 3 Research Nozomi 2024 CVEs/methodology Blog
Industry Report Check Point DJI Research Check Point 2018 Hijacking vulnerabilities Check Point
Whitepaper UAV Exploitation: A New Domain for Cyber Power CCDCOE 2018 Military UAV risks Download
Whitepaper Drone Security: Issues and Challenges ResearchGate Various Usage/protection concerns PDF
Whitepaper Drone Vulnerabilities: Offensive Introduction SecQuest Various Protocol exploits Link

Conference Archives & Additional Resources


🎓 Training & Certifications

Professional Training Programs

Provider Program Cost Focus
DroneSec DSOC Certificate $500-2000 Fundamentals, Counter-Drone, Offensive Ops
CISA/NICCS Drone Security and Countermeasures Free Detection, Analysis, Countermeasures
SANS IoT Security (includes drones) $6000+ Enterprise security
OffSec Custom drone modules Varies Penetration testing

Online Learning Resources

  • Udemy/Coursera/Cybrary: UAV security courses
  • YouTube Channels: Null Byte, LiveOverflow, HackerSploit, DroneSec
  • TryHackMe: IoT paths adaptable to drones
  • Class Central: Aggregated drone security courses

📖 Books & Guides

Technical Books

  1. "Basics of Hacking and Penetration Testing" (Engebretson): Ethical foundations
  2. "Practical IoT Hacking" (Chantzis et al.): Drone chapter
  3. "Hardware Hacking Handbook" (van Woudenberg/O'Flynn): Side-channels

Online Documentation

Whitepapers & Reports

  • OWASP Drone Security Cheat Sheet
  • NIST Guidelines (in development)
  • EU EASA/FAA Remote ID regulations
  • "UAV Exploitation: A New Domain for Cyber Power" (CCDCOE PDF): Military UAV risks. Download
  • "Drone Security: Issues and Challenges" (ResearchGate PDF). PDF
  • "Drone Vulnerabilities: Offensive Introduction" (SecQuest Whitepaper): Protocol exploits in commercial drones. Link

🎮 CTFs & Practice Labs

Capture The Flag Events

  • DroneSec CTF: Regular drone security challenges
  • DEF CON Aerospace Village CTF: Annual competition
  • Hack The Drone: Specialized drone hacking CTF
  • General CTFs: HackTheBox, TryHackMe IoT paths

Practice Environments

Virtual Labs:

  • Damn Vulnerable Drone (DVD): Docker-based vulnerable UAV
  • ArduPilot SITL: Software-in-the-loop simulation
  • DroneKit-SITL: Python-based MAVLink testing

Physical Labs:

  • Budget Setup ($500-1000): DJI Tello + Alfa + RTL-SDR
  • Intermediate ($1000-3000): HackRF + Parrot Bebop
  • Professional ($3000+): USRP + ChipWhisperer + DJI Mavic

👥 Community & Resources

Forums & Discussion

Bug Bounty Programs

Company Platform Reward Range Focus
DJI HackerOne $100 - $30,000 Consumer drones
Parrot Direct Varies Commercial drones
Autel Direct Varies Professional drones

Social Media & News

Twitter/X Accounts:

  • @DroneSec, @nozominetworks, @MalwareTechBlog
  • @samykamkar, @troyhunt, @hackerfantastic

News Sources:

  • DroneSec.com, Threatpost, Hacker News
  • Ars Technica, Krebs on Security

⚖️ Legal & Ethical Considerations

⚠️ CRITICAL WARNINGS

Activity Legal Status Penalties Safe Alternatives
GPS Jamming/Spoofing ILLEGAL $112k fines + imprisonment Controlled lab environments
RF Interference ILLEGAL FCC violations Licensed testing only
Drone Hijacking CRIMINAL Terrorism charges Own equipment only
Vulnerability Research Legal (with permission) Responsible disclosure Bug bounty programs

Ethical Guidelines

  1. Responsible Disclosure: Report to manufacturer first
  2. Controlled Testing: Use your own equipment or authorized environments
  3. No Interference: Never disrupt emergency or critical operations
  4. Privacy Respect: Focus on security, not surveillance
  5. Legal Compliance: Follow local laws and regulations

🔬 Advanced Topics

Counter-Drone Systems

graph TD
    A[Counter-Drone System] --> B[Detection]
    A --> C[Mitigation]
    
    B --> B1[RF Detection]
    B --> B2[Radar]
    B --> B3[Acoustic]
    B --> B4[Optical]
    B --> B5[Hybrid]
    
    C --> C1[Spoofing]
    C --> C2[Jamming]
    C --> C3[Net Capture]
    C --> C4[Laser]
    C --> C5[Cyber Takeover]
Loading

Swarm Security

Emerging Threats:

  • Coordinated swarm attacks
  • AI-powered autonomous swarms
  • Consensus algorithm exploits
  • Leader targeting attacks

AI/ML in Drone Security

Offensive Applications:

  • Automated vulnerability discovery
  • Adaptive spoofing techniques
  • Machine learning-based protocol analysis

Defensive Applications:

  • Anomaly detection systems
  • Predictive threat modeling
  • Behavioral analysis

📊 Vulnerability Database

Notable CVEs & Exploits

DJI Vulnerabilities

CVE CVSS Description Year
CVE-2023-6951 6.6 Mavic 3 QuickTransfer weak credentials 2023
CVE-2023-51454/55/56 6.8 vtwo_sdk buffer overflows 2023
CVE-2023-6950 3.0 FTP DoS vulnerability 2023

Historical Incidents

  • 2009 MQ-1 Predator: Unencrypted video feed interception
  • 2011 RQ-170: GPS spoofing capture by Iran
  • 2011 Drone Keylogger: Keylogger infected ground-control station at Creech AFB
  • 2018 DJI Account Hijacking: Check Point discovery
  • 2024 Ukraine Operations: Coordinated drone attacks
  • 2024-2025 Recent Incidents:
    • Ukraine Operation Spider Web (June 2025): Coordinated attack on Russian bombers; 20 aircraft damaged
    • Paris Olympics 2024: Canadian spy drones
    • Nashville Power Grid (2024): Substation attempt
    • US Bases (2024): 350+ incursions
    • Green Day Concert (2024): Unauthorized drone halt
    • Tower 22 (2024): Iraqi drone kills 3 US soldiers
  • Historical Context:
    • Gatwick (2018): Shutdown from sightings
    • Venezuela Maduro Attempt (2018): Assassination drone
    • Syria ISIS (2016-2017): Weaponized commercial drones

Search Tools

# CVE search
curl -s "https://cve.circl.lu/api/search/drone" | jq

# Exploit database
searchsploit dji

# GitHub vulnerability search
site:github.com drone vulnerability

🧪 Lab Exercises

Beginner Level

  1. SITL Setup

    # Install ArduPilot SITL
    git clone https://github.com/ArduPilot/ardupilot.git
    cd ardupilot
    ./Tools/environment_install/install-prereqs-ubuntu.sh
  2. Wi-Fi Reconnaissance

    # Monitor mode
    airmon-ng start wlan0
    airodump-ng -c [channel] --bssid [target] -w capture wlan0mon
  3. MAVLink Analysis

    # Capture MAVLink traffic
    tcpdump -i any -w mavlink.pcap port 14550

Intermediate Level

  1. GPS Simulation

    # Generate GPS signal
    ./gps-sdr-sim -b 8 -s 2600000 -e brdc3540.14n -l 37.7749,-122.4194,100
    
    # Transmit
    hackrf_transfer -t gpssim.bin -f 1575420000 -s 2600000 -a 1 -x 40 -R
  2. Firmware Extraction

    # Extract firmware
    binwalk -e firmware.bin
    
    # Analyze filesystem
    file extracted_files/*

Advanced Level

  1. Exploit Development

    • Buffer overflow PoC development
    • ROP chain construction
    • Shellcode injection
  2. SDR Signal Analysis

    • Custom GNU Radio blocks
    • Protocol reverse engineering
    • Signal modulation analysis

📺 Video Resources

Educational Channels

Channel Focus Notable Videos
Null Byte Wireless security "Hack a Drone", "GPS Explained"
HackerSploit Penetration testing "Drone Pentesting", "MAVLink Tutorial"
Great Scott Gadgets SDR "HackRF Tutorial", "SDR Beginners"
DroneBot Workshop Electronics "Drone Components", "Flight Controller"

Conference Archives

  • DEF CON Media Server: media.defcon.org
  • Black Hat YouTube: Conference presentations
  • USENIX Security: Academic research videos
  • Chaos Communication Congress: Privacy and activism focus

🔧 Hardware Recommendations

Essential Setup ($500)

Component Recommendation Price Purpose
Test Drone DJI Tello $100 Basic testing
Wi-Fi Adapter Alfa AWUS036ACH $50 Monitor mode
SDR RTL-SDR v3 $30 RF monitoring
Raspberry Pi Pi 4 (4GB) $75 Companion computer
GPS Module Neo-6M $20 GPS testing
Storage 64GB microSD $15 Data logging

Intermediate Setup ($1500)

Additions:

  • HackRF One ($300) - Full TX/RX capability
  • Parrot Bebop 2 ($250) - Advanced testing platform
  • Wi-Fi Pineapple ($100) - Professional Wi-Fi testing
  • Logic Analyzer ($50) - Digital signal analysis

Professional Setup ($5000+)

Advanced Equipment:

  • USRP B200 ($1100) - Professional SDR
  • ChipWhisperer Pro ($1500) - Side-channel analysis
  • Spectrum Analyzer ($1000+) - RF analysis
  • DJI Mavic 3 ($1500+) - High-end test platform
  • Oscilloscope ($500+) - Signal analysis

🤝 Contributing

We welcome contributions! Here's how you can help:

How to Contribute

  1. Fork the repository
  2. Create a feature branch: git checkout -b feature/amazing-resource
  3. Add your resource: Follow the existing format
  4. Test your links: Ensure all links are working
  5. Submit a pull request: Describe your changes

Contribution Guidelines

  • ✅ High-quality, verified resources only
  • ✅ Working links and up-to-date information
  • ✅ No promotional or commercial content
  • ✅ Ethical and legal compliance
  • ✅ Proper categorization

What We're Looking For

  • Tools: New penetration testing frameworks
  • Papers: Recent research publications
  • Talks: Conference presentations and slides
  • Tutorials: Step-by-step guides
  • CTFs: Practice challenges and labs
  • Bug Bounties: Vulnerability disclosure programs
  • Communities: Active discussion forums

📜 Disclaimer

⚠️ EDUCATIONAL PURPOSES ONLY ⚠️

Important Legal Notice:

  • This repository is for educational and research purposes only
  • All activities must comply with local laws and regulations
  • Test only on your own equipment or with explicit permission
  • GPS jamming/spoofing is illegal in most jurisdictions
  • RF interference requires proper licensing
  • Drone hijacking may constitute criminal activity
  • Always practice responsible disclosure

No Liability:

  • The authors are not responsible for any misuse of this information
  • Users assume full responsibility for their actions
  • Always verify legal compliance before conducting any security research

📚 References

Key Organizations

Academic Institutions

  • UT Austin: GPS spoofing research
  • Virginia Tech: Wireless UAV security
  • Carnegie Mellon: CyLab security research
  • MIT: Aerospace security studies

Industry Leaders

  • IOActive: Hardware security research
  • Check Point: Drone vulnerability research
  • Nozomi Networks: Industrial drone security
  • D-Fend Solutions: Counter-drone technology

📞 Contact & Community

Get Involved

  • GitHub Discussions: Share ideas and ask questions
  • DroneSec Discord: Join the professional community
  • Twitter/X: Follow #DroneHacking #UAVSecurity
  • Reddit: Participate in r/netsec, r/AskNetsec

Report Issues

  • GitHub Issues: Bug reports and feature requests
  • Pull Requests: Contribute improvements
  • Discussions: General questions and ideas

⭐ Acknowledgments

Special thanks to:

  • ArduPilot/PX4 communities for open-source contributions
  • DroneSec training for educational resources
  • Security researchers who responsibly disclosed vulnerabilities
  • Open-source contributors who built amazing tools
  • Conference organizers (DEF CON, Black Hat) for knowledge sharing
  • Academic researchers advancing the field

📅 Changelog

Latest Updates (2025-01-25)

  • ✅ Merged comprehensive resources from multiple sources
  • ✅ Added offensive security focus and advanced techniques
  • ✅ Updated research papers and conference talks to 2025
  • ✅ Structured learning path with clear progression
  • ✅ Added practical lab exercises and hardware recommendations
  • ✅ Enhanced legal and ethical guidelines

📖 License

This project is licensed under the MIT License - see the LICENSE file for details.

You are free to:

  • ✅ Share and distribute
  • ✅ Modify and adapt
  • ✅ Use commercially
  • ✅ Include in proprietary software

Requirements:

  • 📝 Include copyright notice
  • 📝 Include license text
  • 📝 No warranty provided

🎯 Final Words

Drone security is critical as UAS proliferate across industries.

Research safely to enhance defenses and protect our skies.

Stay curious, ethical, and legal in your security journey.


Happy (Ethical) Hacking!


Last Updated: January 25, 2025
Maintained by: Seedon D'Souza
Repository: github.com/seedon198/DroneSec-Resources


Star History Chart


GitHub stars GitHub forks GitHub issues GitHub pull requests

About

A collection of drone security resources

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors