A comprehensive collection of resources for learning and mastering drone/UAV security, with a strong focus on offensive security techniques including firmware analysis, radio protocols, side-channel attacks, electromagnetic (EM) analysis, and exploitation.
- 🎯 Introduction
- 🚀 Getting Started
- 📚 Learning Path
- 🔒 Core Topics
- 🛠️ Tools & Frameworks
- 📄 Research Papers & Conference Talks
- 🎓 Training & Certifications
- 📖 Books & Guides
- 🎮 CTFs & Practice Labs
- 👥 Community & Resources
- ⚖️ Legal & Ethical Considerations
- 🔬 Advanced Topics
- 📊 Vulnerability Database
- 🧪 Lab Exercises
- 📺 Video Resources
- 🔧 Hardware Recommendations
- 🤝 Contributing
- 📜 Disclaimer
- 📚 References
This repository is a curated, comprehensive collection of resources for security researchers, penetration testers, and enthusiasts interested in drone/UAV security. The emphasis is on offensive security techniques to understand, exploit, and mitigate vulnerabilities in unmanned aerial systems (UAS).
| Rapid Growth | Critical Infrastructure | Emerging Threats | Vulnerability Surface |
|---|---|---|---|
| 1.1M+ drones in US | Military, Law Enforcement | 350+ incursions (2024) | RF, GPS, Firmware, EM |
| $43B market by 2025 | Commercial, Civilian | Urban Air Mobility | Wi-Fi, Bluetooth, MAVLink |
graph TD
A[Drone/UAV] --> B[Wireless Communication]
A --> C[Hardware Components]
A --> D[Firmware/Software]
A --> E[Mobile Apps/Backend]
B --> B1[RF Links]
B --> B2[GPS/GNSS]
B --> B3[Wi-Fi/Bluetooth]
B --> B4[MAVLink Protocol]
C --> C1[Flight Controller]
C --> C2[Sensors - IMU/GPS]
C --> C3[Debug Ports - UART/JTAG]
C --> C4[Side-Channel Leaks]
D --> D1[Firmware Updates]
D --> D2[Authentication]
D --> D3[Encryption]
D --> D4[Backdoors]
E --> E1[Ground Control Station]
E --> E2[Cloud Services]
E --> E3[API Vulnerabilities]
E --> E4[Data Leakage]
Essential Knowledge:
- Basic electronics and embedded systems
- Wireless protocols (Wi-Fi, Bluetooth, RF)
- Linux/Unix command line
- Python/C++ programming
- Networking fundamentals
Hardware Setup (Optional but Recommended):
| Component | Entry Level | Intermediate | Professional |
|---|---|---|---|
| Test Drone | DJI Tello ($100) | Parrot Bebop 2 ($200) | DJI Mavic 3 ($1500+) |
| SDR | RTL-SDR ($30) | HackRF One ($300) | USRP ($1000+) |
| Wi-Fi | Alfa AWUS036ACH ($50) | Wi-Fi Pineapple ($100) | Professional gear |
| Analysis | Laptop + Software | Logic Analyzer ($50) | ChipWhisperer ($1500) |
-
Start with Fundamentals (1-2 weeks)
-
Set up Virtual Environment (1 week)
- ArduPilot SITL (Software In The Loop)
- Damn Vulnerable Drone
-
Practice with Tools (2-4 weeks)
- Wireshark for packet analysis
- GNU Radio for SDR
- Ghidra for reverse engineering
Focus: Understanding drone architecture and basic security concepts
- ✅ Drone components and communication protocols
- ✅ MAVLink protocol basics
- ✅ Wireless security fundamentals
- ✅ Virtual testing environment setup
Resources:
- Complete Drone Security Bundle - Comprehensive training
- ArduPilot Documentation
- MAVLink Developer Guide
Focus: Hands-on attack techniques and analysis
- ✅ Wireless attacks (deauth, MITM)
- ✅ GPS vulnerabilities and spoofing
- ✅ Protocol analysis and fuzzing
- ✅ Firmware extraction and analysis
Resources:
Focus: Reverse engineering and advanced exploitation
- ✅ ARM/MIPS firmware analysis
- ✅ SDR signal generation and analysis
- ✅ Advanced GPS spoofing techniques
- ✅ Exploit development
Focus: Research and specialization
- ✅ Side-channel attacks (power/EM analysis)
- ✅ RF exploitation and protocol reversing
- ✅ Original research and bug bounties
- ✅ Conference presentations and publications
graph LR
A[Ground Control Station] --> B[Radio Link]
B --> C[Flight Controller]
C --> D[ESCs]
C --> E[Sensors]
C --> F[Companion Computer]
D --> G[Motors]
E --> H[IMU]
E --> I[GPS]
E --> J[Camera]
F --> K[AI/ML Processing]
F --> L[Additional Sensors]
Key Components:
- Flight Controller (FC): ArduPilot, PX4, DJI proprietary
- ESCs: Electronic Speed Controllers for motor control
- Sensors: IMU, GPS, barometer, magnetometer
- Communication: MAVLink, DroneCAN, proprietary protocols
| Protocol | Frequency | Security | Use Case |
|---|---|---|---|
| MAVLink | Various | Basic (v1.0) / Signed (v2.0) | Standard drone communication |
| Wi-Fi | 2.4/5.8 GHz | WPA2/WPA3 | Video streaming, telemetry |
| Bluetooth | 2.4 GHz | BLE security | Mobile app control |
| GPS | 1.575 GHz | None (civilian) | Navigation |
| DJI OcuSync | 2.4/5.8 GHz | Proprietary | DJI drones |
| Wireless | Hardware | Firmware | Applications |
|---|---|---|---|
| RF Jamming/Spoofing | Debug Port Access | Binary Analysis | Mobile App Vulnerabilities |
| GPS Manipulation | Side-Channel Attacks | Firmware Modification | Cloud Service Exploits |
| Protocol Hijacking | Hardware Trojans | Authentication Bypass | Network Infrastructure |
| Tool | Description | GitHub | Use Case |
|---|---|---|---|
| DroneSploit | Metasploit-like framework for drone exploits | Link | Automated exploitation |
| Damn Vulnerable Drone | Intentionally vulnerable UAV simulation | Link | Learning environment |
| Drone Hacking Tool | GUI for Wi-Fi/GPS attacks | Link | User-friendly interface |
| Firmware Ninja | UAV binary reverse engineering | Binary Ninja | Firmware analysis |
| DRAT | DJI Mavic assessment framework | ACM CICSYN 2020 | DJI vulnerability assessment |
| FIMI A3 RE | Firmware/camera reverse engineering | GitHub | FIMI drone analysis |
| RUB-SysSec/DroneSecurity | Open-source frameworks for fuzzing drone protocols | GitHub | Protocol fuzzing and DroneID decoding |
| DJI-Firmware-Tools | DJI firmware extraction and analysis | GitHub | DJI firmware unpacking |
- Dronesploit Analysis: DroneSec Blog
- Drone Operation and Demolition Guide: Medium Guide
- Airspace Mapper: Tool for tracing drone communications
Hardware Recommendations:
| SDR Device | Price | Frequency Range | TX/RX | Best For |
|---|---|---|---|---|
| RTL-SDR v3 | $30 | 24MHz - 1.7GHz | RX only | Beginners, monitoring |
| HackRF One | $300 | 1MHz - 6GHz | TX/RX | General purpose |
| BladeRF 2.0 | $420 | 47MHz - 6GHz | TX/RX | Professional use |
| USRP B200 | $1100 | 70MHz - 6GHz | TX/RX | Research, development |
Software Stack:
- GNU Radio - Signal processing framework
- GQRX - Spectrum analyzer
- SDRangel - Multi-purpose SDR application
- URH - Universal Radio Hacker
# Firmware extraction
binwalk -e firmware.bin
# Static analysis
ghidra firmware.bin
# Dynamic analysis
qemu-system-arm -M versatilepb -kernel firmware.bin
# Protocol analysis
wireshark capture.pcap| Type | Title | Conference/Journal | Year | Focus | Links |
|---|---|---|---|---|---|
| Conference Talk | Drones Hijacking: Multi-Dimensional Attack Vectors | DEF CON 24 | 2016 | Architecture exploits | Video | Slides |
| Conference Talk | Practical Aerial Hacking & Surveillance | Black Hat/DEF CON | 2015 | RF interception | Video |
| Conference Talk | Hacking Invisibly & Silently with Light & Sound | DEF CON 25 | 2017 | Non-RF side-channels | Video |
| Conference Talk | Deep Dive: RE & Exploitation of Drones | RECON | 2023 | Firmware/PCB analysis | Slides |
| Conference Talk | Running XBOW Live: Drone Pentesting | Black Hat/DEF CON | 2025 | Vulnerability scanning | Blog/Slides |
| Conference Talk | Hacking a Professional Drone | Black Hat Asia | 2016 | Commercial UAV exploitation | Nils Rodday |
| Conference Talk | Grand Theft Drone – Breaking Drone RF Links | Black Hat USA | Various | Proprietary radio protocols | Multiple presentations |
| Conference Talk | Drone Attacks on Industrial Wireless | Black Hat USA | Various | Industrial wireless vulnerabilities | Multiple presentations |
| Conference Talk | SkyJack: Autonomous Drone Hacking | DEF CON 21 | 2013 | Autonomous hijacking | Samy Kamkar |
| Conference Talk | Maldrone: First Malware for Drones | DEF CON 23 | 2015 | First drone malware | Rahul Sasi |
| Conference Talk | DJI Drone Security: A Hacker's Perspective | 47C3 (CCC) | 2021 | Hardware analysis | DJI Mini-series compromise |
| Research Paper | Comprehensive Survey of Security/Privacy in UAV Systems | IEEE | 2025 | Hardware/software/comms attacks | IEEE |
| Research Paper | Comprehensive Survey on Anti-UAV Methods | arXiv | 2025 | Detection/offensive benchmarking | arXiv |
| Research Paper | Drone Cybersecurity Issues, Solutions, and Trends | ACM | 2023 | Privacy dissection | ACM |
| Research Paper | Cyber4Drone: Systematic Review of Security & Forensics | MDPI | 2023 | Threat models/forensics | MDPI |
| Research Paper | Secure UAV (Drone) and the Great Promise of AI | ACM CSUR | 2024 | AI/security roadmap | ACM CSUR |
| Research Paper | A Security Review in the UAVNet Era | ACM CSUR | 2022 | Threats/countermeasures | ACM CSUR |
| Research Paper | A Survey on Security and Privacy Issues of UAVs | ScienceDirect | 2023 | 4-level categorization | ScienceDirect |
| Research Paper | Surveying Cybersecurity Vulnerabilities... for UAVs | Comp Networks | 2024 | Auth/physical layer | Comp Networks |
| Research Paper | Security Vulnerabilities of UAVs... | IEEE | 2018 | DJI Phantom 4 Pro experiments | IEEE |
| Research Paper | Unmanned Aircraft Capture... | JFR | 2014 | GPS spoofing | JFR |
| Research Paper | On GPS Spoofing... | PeerJ CS | 2021 | Threats/methods | PeerJ CS |
| Research Paper | ML in Internet-of-Drones | ACM CSUR | 2023 | IDS | ACM CSUR |
| Research Paper | Vuln Analysis of MAVLink | DoD/AFIT | Various | CIA flaws | DoD/AFIT |
| Research Paper | Security Analysis of FHSS Drone Controller | Various | 2016 | FHSS vulnerabilities | Various |
| Research Paper | Securing Commercial WiFi UAVs | IEEE MILCOM | 2016 | WiFi security | IEEE MILCOM |
| Research Paper | Practical GPS Spoofing on Consumer Drones | U Hawaii | 2020 | Hardware/models | U Hawaii |
| Research Paper | Implementation-Based GPS Spoofing for UAVs | Bahcesehir U | 2024 | Defenses/HackRF | Bahcesehir U |
| Research Paper | Cyber Security Vulns in UAVs | KTH | 2019 | STRIDE/taxonomy | KTH |
| Research Paper | Safeguarding UAVs Against Side-Channel Analysis | IEEE | 2022 | Motor noise for key prevention | IEEE |
| Research Paper | Side-Channel-Driven IDS for UAVs | Various | 2024 | Leakage detection/fault injection | |
| Research Paper | Drone Security and Fault Injection Attacks | IOActive | 2023 | Platform for attacks on commercial UAVs | Whitepaper |
| Research Paper | Review of Intentional EM Interference on UAV Sensors | MDPI | 2022 | IEMI on modules | MDPI |
| Research Paper | Paralyzing Drones via EMI Signal Injection | NDSS | 2023 | IMU corruption | NDSS |
| Research Paper | UAV Identification via EM Emissions | ACM | 2025 | Impersonation | ACM |
| Research Paper | Framework for Sensing RF Spectrum Attacks on UAVs | IEEE | 2020 | Jamming/spoofing on GPS/RF | IEEE |
| Research Paper | On GPS Spoofing of Aerial Platforms | PMC | 2021 | Threats/countermeasures | PMC |
| Research Paper | Framework for Preventing Unauthorized Intrusions | ScienceDirect | 2024 | Jamming vs. spoofing | ScienceDirect |
| Research Paper | Reverse Engineering and Retrofitting RAV Controls | ACM | 2022 | Binary patching | ACM |
| Research Paper | Challenges in Drone Firmware Analyses (DJI) | IEEE | 2024 | Dynamic methodology | IEEE |
| Research Paper | DJI Mavic 3: Firmware Analysis | Nozomi | 2023 | Packer bypass | Blog |
| Industry Report | Global Guardian Threat Assessment | Various | 2025 | Espionage/countermeasures | Various |
| Industry Report | Nozomi DJI Mavic 3 Research | Nozomi | 2024 | CVEs/methodology | Blog |
| Industry Report | Check Point DJI Research | Check Point | 2018 | Hijacking vulnerabilities | Check Point |
| Whitepaper | UAV Exploitation: A New Domain for Cyber Power | CCDCOE | 2018 | Military UAV risks | Download |
| Whitepaper | Drone Security: Issues and Challenges | ResearchGate | Various | Usage/protection concerns | |
| Whitepaper | Drone Vulnerabilities: Offensive Introduction | SecQuest | Various | Protocol exploits | Link |
- DEF CON Media Server
- Black Hat Archives
- Aerospace Village
- DEF CON 19-25 Archives (search "drone")
- Chaos Communication Congress
- USENIX Security
- NDSS Symposium
- IEEE UAV Workshops
| Provider | Program | Cost | Focus |
|---|---|---|---|
| DroneSec | DSOC Certificate | $500-2000 | Fundamentals, Counter-Drone, Offensive Ops |
| CISA/NICCS | Drone Security and Countermeasures | Free | Detection, Analysis, Countermeasures |
| SANS | IoT Security (includes drones) | $6000+ | Enterprise security |
| OffSec | Custom drone modules | Varies | Penetration testing |
- Udemy/Coursera/Cybrary: UAV security courses
- YouTube Channels: Null Byte, LiveOverflow, HackerSploit, DroneSec
- TryHackMe: IoT paths adaptable to drones
- Class Central: Aggregated drone security courses
- "Basics of Hacking and Penetration Testing" (Engebretson): Ethical foundations
- "Practical IoT Hacking" (Chantzis et al.): Drone chapter
- "Hardware Hacking Handbook" (van Woudenberg/O'Flynn): Side-channels
- ArduPilot/PX4/MAVLink/Ghidra documentation
- ArduPilot Developer Documentation
- PX4 Developer Guide
- DroneCode Project
- MAVLink Developer Guide
- OWASP Drone Security Cheat Sheet
- NIST Guidelines (in development)
- EU EASA/FAA Remote ID regulations
- "UAV Exploitation: A New Domain for Cyber Power" (CCDCOE PDF): Military UAV risks. Download
- "Drone Security: Issues and Challenges" (ResearchGate PDF). PDF
- "Drone Vulnerabilities: Offensive Introduction" (SecQuest Whitepaper): Protocol exploits in commercial drones. Link
- DroneSec CTF: Regular drone security challenges
- DEF CON Aerospace Village CTF: Annual competition
- Hack The Drone: Specialized drone hacking CTF
- General CTFs: HackTheBox, TryHackMe IoT paths
Virtual Labs:
- Damn Vulnerable Drone (DVD): Docker-based vulnerable UAV
- ArduPilot SITL: Software-in-the-loop simulation
- DroneKit-SITL: Python-based MAVLink testing
Physical Labs:
- Budget Setup ($500-1000): DJI Tello + Alfa + RTL-SDR
- Intermediate ($1000-3000): HackRF + Parrot Bebop
- Professional ($3000+): USRP + ChipWhisperer + DJI Mavic
- ArduPilot Forum: discuss.ardupilot.org
- DroneSec Discord/Slack: Professional community
- Reddit: r/Multicopter, r/drones, r/netsec, r/UAVsecurity
- GitHub: awesome-drone-hacking
| Company | Platform | Reward Range | Focus |
|---|---|---|---|
| DJI | HackerOne | $100 - $30,000 | Consumer drones |
| Parrot | Direct | Varies | Commercial drones |
| Autel | Direct | Varies | Professional drones |
Twitter/X Accounts:
- @DroneSec, @nozominetworks, @MalwareTechBlog
- @samykamkar, @troyhunt, @hackerfantastic
News Sources:
- DroneSec.com, Threatpost, Hacker News
- Ars Technica, Krebs on Security
| Activity | Legal Status | Penalties | Safe Alternatives |
|---|---|---|---|
| GPS Jamming/Spoofing | ILLEGAL | $112k fines + imprisonment | Controlled lab environments |
| RF Interference | ILLEGAL | FCC violations | Licensed testing only |
| Drone Hijacking | CRIMINAL | Terrorism charges | Own equipment only |
| Vulnerability Research | Legal (with permission) | Responsible disclosure | Bug bounty programs |
- Responsible Disclosure: Report to manufacturer first
- Controlled Testing: Use your own equipment or authorized environments
- No Interference: Never disrupt emergency or critical operations
- Privacy Respect: Focus on security, not surveillance
- Legal Compliance: Follow local laws and regulations
graph TD
A[Counter-Drone System] --> B[Detection]
A --> C[Mitigation]
B --> B1[RF Detection]
B --> B2[Radar]
B --> B3[Acoustic]
B --> B4[Optical]
B --> B5[Hybrid]
C --> C1[Spoofing]
C --> C2[Jamming]
C --> C3[Net Capture]
C --> C4[Laser]
C --> C5[Cyber Takeover]
Emerging Threats:
- Coordinated swarm attacks
- AI-powered autonomous swarms
- Consensus algorithm exploits
- Leader targeting attacks
Offensive Applications:
- Automated vulnerability discovery
- Adaptive spoofing techniques
- Machine learning-based protocol analysis
Defensive Applications:
- Anomaly detection systems
- Predictive threat modeling
- Behavioral analysis
| CVE | CVSS | Description | Year |
|---|---|---|---|
| CVE-2023-6951 | 6.6 | Mavic 3 QuickTransfer weak credentials | 2023 |
| CVE-2023-51454/55/56 | 6.8 | vtwo_sdk buffer overflows | 2023 |
| CVE-2023-6950 | 3.0 | FTP DoS vulnerability | 2023 |
- 2009 MQ-1 Predator: Unencrypted video feed interception
- 2011 RQ-170: GPS spoofing capture by Iran
- 2011 Drone Keylogger: Keylogger infected ground-control station at Creech AFB
- 2018 DJI Account Hijacking: Check Point discovery
- 2024 Ukraine Operations: Coordinated drone attacks
- 2024-2025 Recent Incidents:
- Ukraine Operation Spider Web (June 2025): Coordinated attack on Russian bombers; 20 aircraft damaged
- Paris Olympics 2024: Canadian spy drones
- Nashville Power Grid (2024): Substation attempt
- US Bases (2024): 350+ incursions
- Green Day Concert (2024): Unauthorized drone halt
- Tower 22 (2024): Iraqi drone kills 3 US soldiers
- Historical Context:
- Gatwick (2018): Shutdown from sightings
- Venezuela Maduro Attempt (2018): Assassination drone
- Syria ISIS (2016-2017): Weaponized commercial drones
# CVE search
curl -s "https://cve.circl.lu/api/search/drone" | jq
# Exploit database
searchsploit dji
# GitHub vulnerability search
site:github.com drone vulnerability-
SITL Setup
# Install ArduPilot SITL git clone https://github.com/ArduPilot/ardupilot.git cd ardupilot ./Tools/environment_install/install-prereqs-ubuntu.sh
-
Wi-Fi Reconnaissance
# Monitor mode airmon-ng start wlan0 airodump-ng -c [channel] --bssid [target] -w capture wlan0mon -
MAVLink Analysis
# Capture MAVLink traffic tcpdump -i any -w mavlink.pcap port 14550
-
GPS Simulation
# Generate GPS signal ./gps-sdr-sim -b 8 -s 2600000 -e brdc3540.14n -l 37.7749,-122.4194,100 # Transmit hackrf_transfer -t gpssim.bin -f 1575420000 -s 2600000 -a 1 -x 40 -R
-
Firmware Extraction
# Extract firmware binwalk -e firmware.bin # Analyze filesystem file extracted_files/*
-
Exploit Development
- Buffer overflow PoC development
- ROP chain construction
- Shellcode injection
-
SDR Signal Analysis
- Custom GNU Radio blocks
- Protocol reverse engineering
- Signal modulation analysis
| Channel | Focus | Notable Videos |
|---|---|---|
| Null Byte | Wireless security | "Hack a Drone", "GPS Explained" |
| HackerSploit | Penetration testing | "Drone Pentesting", "MAVLink Tutorial" |
| Great Scott Gadgets | SDR | "HackRF Tutorial", "SDR Beginners" |
| DroneBot Workshop | Electronics | "Drone Components", "Flight Controller" |
- DEF CON Media Server: media.defcon.org
- Black Hat YouTube: Conference presentations
- USENIX Security: Academic research videos
- Chaos Communication Congress: Privacy and activism focus
| Component | Recommendation | Price | Purpose |
|---|---|---|---|
| Test Drone | DJI Tello | $100 | Basic testing |
| Wi-Fi Adapter | Alfa AWUS036ACH | $50 | Monitor mode |
| SDR | RTL-SDR v3 | $30 | RF monitoring |
| Raspberry Pi | Pi 4 (4GB) | $75 | Companion computer |
| GPS Module | Neo-6M | $20 | GPS testing |
| Storage | 64GB microSD | $15 | Data logging |
Additions:
- HackRF One ($300) - Full TX/RX capability
- Parrot Bebop 2 ($250) - Advanced testing platform
- Wi-Fi Pineapple ($100) - Professional Wi-Fi testing
- Logic Analyzer ($50) - Digital signal analysis
Advanced Equipment:
- USRP B200 ($1100) - Professional SDR
- ChipWhisperer Pro ($1500) - Side-channel analysis
- Spectrum Analyzer ($1000+) - RF analysis
- DJI Mavic 3 ($1500+) - High-end test platform
- Oscilloscope ($500+) - Signal analysis
We welcome contributions! Here's how you can help:
- Fork the repository
- Create a feature branch:
git checkout -b feature/amazing-resource - Add your resource: Follow the existing format
- Test your links: Ensure all links are working
- Submit a pull request: Describe your changes
- ✅ High-quality, verified resources only
- ✅ Working links and up-to-date information
- ✅ No promotional or commercial content
- ✅ Ethical and legal compliance
- ✅ Proper categorization
- Tools: New penetration testing frameworks
- Papers: Recent research publications
- Talks: Conference presentations and slides
- Tutorials: Step-by-step guides
- CTFs: Practice challenges and labs
- Bug Bounties: Vulnerability disclosure programs
- Communities: Active discussion forums
Important Legal Notice:
- This repository is for educational and research purposes only
- All activities must comply with local laws and regulations
- Test only on your own equipment or with explicit permission
- GPS jamming/spoofing is illegal in most jurisdictions
- RF interference requires proper licensing
- Drone hijacking may constitute criminal activity
- Always practice responsible disclosure
No Liability:
- The authors are not responsible for any misuse of this information
- Users assume full responsibility for their actions
- Always verify legal compliance before conducting any security research
- UT Austin: GPS spoofing research
- Virginia Tech: Wireless UAV security
- Carnegie Mellon: CyLab security research
- MIT: Aerospace security studies
- IOActive: Hardware security research
- Check Point: Drone vulnerability research
- Nozomi Networks: Industrial drone security
- D-Fend Solutions: Counter-drone technology
- GitHub Discussions: Share ideas and ask questions
- DroneSec Discord: Join the professional community
- Twitter/X: Follow #DroneHacking #UAVSecurity
- Reddit: Participate in r/netsec, r/AskNetsec
- GitHub Issues: Bug reports and feature requests
- Pull Requests: Contribute improvements
- Discussions: General questions and ideas
Special thanks to:
- ArduPilot/PX4 communities for open-source contributions
- DroneSec training for educational resources
- Security researchers who responsibly disclosed vulnerabilities
- Open-source contributors who built amazing tools
- Conference organizers (DEF CON, Black Hat) for knowledge sharing
- Academic researchers advancing the field
- ✅ Merged comprehensive resources from multiple sources
- ✅ Added offensive security focus and advanced techniques
- ✅ Updated research papers and conference talks to 2025
- ✅ Structured learning path with clear progression
- ✅ Added practical lab exercises and hardware recommendations
- ✅ Enhanced legal and ethical guidelines
This project is licensed under the MIT License - see the LICENSE file for details.
You are free to:
- ✅ Share and distribute
- ✅ Modify and adapt
- ✅ Use commercially
- ✅ Include in proprietary software
Requirements:
- 📝 Include copyright notice
- 📝 Include license text
- 📝 No warranty provided
Drone security is critical as UAS proliferate across industries.
Research safely to enhance defenses and protect our skies.
Stay curious, ethical, and legal in your security journey.
Last Updated: January 25, 2025
Maintained by: Seedon D'Souza
Repository: github.com/seedon198/DroneSec-Resources