November 2022 Add FIles
This commit is contained in:
parent
4c104a3c60
commit
2a5e3aa214
28
433mhz_remote_timejam/433mhz_remote_timejam.ino
Normal file
28
433mhz_remote_timejam/433mhz_remote_timejam.ino
Normal file
@ -0,0 +1,28 @@
|
|||||||
|
|
||||||
|
// For Hackrf Portapack Rolljam capture.
|
||||||
|
// Arduino Mega, connect pin 52 to either of the two middle pins of a 433MHz Receiver Module,
|
||||||
|
// connect pin 53 to 5v on Digispark with DigisparkJammerTimer code,
|
||||||
|
// connect negative from Digispark and Reciever Module to GND on Mega.
|
||||||
|
// ( see https://youtu.be/r8ci0oNYmOA for demo )
|
||||||
|
|
||||||
|
void setup() {
|
||||||
|
Serial.begin(9600);
|
||||||
|
pinMode(51, INPUT);
|
||||||
|
pinMode(53, OUTPUT);
|
||||||
|
}
|
||||||
|
|
||||||
|
void loop ()
|
||||||
|
{
|
||||||
|
int Remote =digitalRead(51);
|
||||||
|
if (Remote) {
|
||||||
|
Serial.println(" Remote Control detected , Timejam activated ....");
|
||||||
|
digitalWrite(53, HIGH);
|
||||||
|
delay(45000);
|
||||||
|
} else {
|
||||||
|
Serial.println("=== nothing detected ..");
|
||||||
|
digitalWrite(53, LOW);
|
||||||
|
|
||||||
|
|
||||||
|
}
|
||||||
|
delay(260);
|
||||||
|
}
|
5
ADSB MAPS/README.md
Normal file
5
ADSB MAPS/README.md
Normal file
@ -0,0 +1,5 @@
|
|||||||
|
# hackrf_havoc_map
|
||||||
|
This file is a generated BIN file, containing the map
|
||||||
|
This is for the Havoc Firmware for the HackRF Portapack
|
||||||
|
It must be on the SD card inside the ADSB folder
|
||||||
|
BIN file generated by Ricardo Alonso Piña , for public use
|
BIN
ADSB MAPS/world_map.bin.zip
Normal file
BIN
ADSB MAPS/world_map.bin.zip
Normal file
Binary file not shown.
2
Replay_Attacks/DeBruijn/Binary/Bi_10.TXT
Normal file
2
Replay_Attacks/DeBruijn/Binary/Bi_10.TXT
Normal file
@ -0,0 +1,2 @@
|
|||||||
|
sample_rate=500000
|
||||||
|
center_frequency=315000000
|
2
Replay_Attacks/DeBruijn/Binary/Bi_11.TXT
Normal file
2
Replay_Attacks/DeBruijn/Binary/Bi_11.TXT
Normal file
@ -0,0 +1,2 @@
|
|||||||
|
sample_rate=500000
|
||||||
|
center_frequency=315000000
|
2
Replay_Attacks/DeBruijn/Binary/Bi_12.TXT
Normal file
2
Replay_Attacks/DeBruijn/Binary/Bi_12.TXT
Normal file
@ -0,0 +1,2 @@
|
|||||||
|
sample_rate=500000
|
||||||
|
center_frequency=315000000
|
2
Replay_Attacks/DeBruijn/Binary/Bi_8.TXT
Normal file
2
Replay_Attacks/DeBruijn/Binary/Bi_8.TXT
Normal file
@ -0,0 +1,2 @@
|
|||||||
|
sample_rate=500000
|
||||||
|
center_frequency=315000000
|
2
Replay_Attacks/DeBruijn/Binary/Bi_9.TXT
Normal file
2
Replay_Attacks/DeBruijn/Binary/Bi_9.TXT
Normal file
@ -0,0 +1,2 @@
|
|||||||
|
sample_rate=500000
|
||||||
|
center_frequency=315000000
|
2
Replay_Attacks/DeBruijn/C16_De-Buijn/10-bit_De-Buijn.TXT
Normal file
2
Replay_Attacks/DeBruijn/C16_De-Buijn/10-bit_De-Buijn.TXT
Normal file
@ -0,0 +1,2 @@
|
|||||||
|
sample_rate=250000
|
||||||
|
|
3
Replay_Attacks/DeBruijn/C16_De-Buijn/10-bit_De-Buijn.c16
Normal file
3
Replay_Attacks/DeBruijn/C16_De-Buijn/10-bit_De-Buijn.c16
Normal file
@ -0,0 +1,3 @@
|
|||||||
|
version https://git-lfs.github.com/spec/v1
|
||||||
|
oid sha256:dfddb9030e3aa4cdaff8335deddbced52f04faade598622060355f6111c210d9
|
||||||
|
size 2548720
|
2
Replay_Attacks/DeBruijn/C16_De-Buijn/11-bit_De-Buijn.TXT
Normal file
2
Replay_Attacks/DeBruijn/C16_De-Buijn/11-bit_De-Buijn.TXT
Normal file
@ -0,0 +1,2 @@
|
|||||||
|
sample_rate=250000
|
||||||
|
|
3
Replay_Attacks/DeBruijn/C16_De-Buijn/11-bit_De-Buijn.c16
Normal file
3
Replay_Attacks/DeBruijn/C16_De-Buijn/11-bit_De-Buijn.c16
Normal file
@ -0,0 +1,3 @@
|
|||||||
|
version https://git-lfs.github.com/spec/v1
|
||||||
|
oid sha256:5120efb2b64455a30fa4855dd64767eac98bbd70014b45f748b859ed6bb42d60
|
||||||
|
size 5274108
|
2
Replay_Attacks/DeBruijn/C16_De-Buijn/12-bit_De-Buijn.TXT
Normal file
2
Replay_Attacks/DeBruijn/C16_De-Buijn/12-bit_De-Buijn.TXT
Normal file
@ -0,0 +1,2 @@
|
|||||||
|
sample_rate=250000
|
||||||
|
|
3
Replay_Attacks/DeBruijn/C16_De-Buijn/12-bit_De-Buijn.c16
Normal file
3
Replay_Attacks/DeBruijn/C16_De-Buijn/12-bit_De-Buijn.c16
Normal file
@ -0,0 +1,3 @@
|
|||||||
|
version https://git-lfs.github.com/spec/v1
|
||||||
|
oid sha256:3f7680e5cfdd107b3e2a0f67fab7faca190769ef91dd80ae05b727b04dc16737
|
||||||
|
size 9578184
|
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
2
Replay_Attacks/DeBruijn/C16_De-Buijn/4-bit_De-Buijn.TXT
Normal file
2
Replay_Attacks/DeBruijn/C16_De-Buijn/4-bit_De-Buijn.TXT
Normal file
@ -0,0 +1,2 @@
|
|||||||
|
sample_rate=250000
|
||||||
|
|
3
Replay_Attacks/DeBruijn/C16_De-Buijn/4-bit_De-Buijn.c16
Normal file
3
Replay_Attacks/DeBruijn/C16_De-Buijn/4-bit_De-Buijn.c16
Normal file
@ -0,0 +1,3 @@
|
|||||||
|
version https://git-lfs.github.com/spec/v1
|
||||||
|
oid sha256:d50d0d3c739b80dc87d97b8ea33e208497b83a30ba9d2b5e75621cd675639f71
|
||||||
|
size 1069732
|
2
Replay_Attacks/DeBruijn/C16_De-Buijn/8-bit_De-Buijn.TXT
Normal file
2
Replay_Attacks/DeBruijn/C16_De-Buijn/8-bit_De-Buijn.TXT
Normal file
@ -0,0 +1,2 @@
|
|||||||
|
sample_rate=250000
|
||||||
|
|
3
Replay_Attacks/DeBruijn/C16_De-Buijn/8-bit_De-Buijn.c16
Normal file
3
Replay_Attacks/DeBruijn/C16_De-Buijn/8-bit_De-Buijn.c16
Normal file
@ -0,0 +1,3 @@
|
|||||||
|
version https://git-lfs.github.com/spec/v1
|
||||||
|
oid sha256:6ef14cbcbe4a978ef66a4bd041e428f677f8ee877002472d625301cdbbf1ed4e
|
||||||
|
size 3815752
|
38
Replay_Attacks/DeBruijn/C16_De-Buijn/README.md
Normal file
38
Replay_Attacks/DeBruijn/C16_De-Buijn/README.md
Normal file
@ -0,0 +1,38 @@
|
|||||||
|
# HackRF-Portapack Files for the DeBruijn attack!
|
||||||
|
|
||||||
|
This is a Github repository devoted to delivering to you
|
||||||
|
the required files to perform the DeBruijn attack from your HackRF-Portapack
|
||||||
|
|
||||||
|
*This is for educational purposes only.
|
||||||
|
I am in NO WAY liable for any actions executed by means of the contents within this
|
||||||
|
repository. PLEASE use responsibly.*
|
||||||
|
|
||||||
|
*If unfamiliar with the debruijn attack: this attack
|
||||||
|
transmits a single signal that contains every possible
|
||||||
|
combination of a specific bit-length in just seconds
|
||||||
|
by overlapping binary sequences*
|
||||||
|
|
||||||
|
*This attack will NOT work on devices that utilize
|
||||||
|
rollling codes*
|
||||||
|
|
||||||
|
## Prerequisites:
|
||||||
|
|
||||||
|
### Hardware:
|
||||||
|
• HackRF and Portapack
|
||||||
|
|
||||||
|
## Getting started:
|
||||||
|
|
||||||
|
Transfer these files to a folder called "DeBruijn" at the
|
||||||
|
root of your Portapack's SD card.
|
||||||
|
|
||||||
|
To perform the attack(s), simply use the "Replay" function
|
||||||
|
within the "Havoc" or "Mayhem" firmware and choose one of
|
||||||
|
these files in the "DeBruijn" folder
|
||||||
|
|
||||||
|
These files are labeled according to what type of key/remote
|
||||||
|
they are calculated for based on bit-length
|
||||||
|
|
||||||
|
Have fun, and *USE RESPONSIBLY*
|
||||||
|
|
||||||
|
*If you'd like to use trinary sequences as well, click [here](https://drive.google.com/drive/folders/182GeXBpSp3klfKB5Phci-zFITLylrn1W?usp=sharing)
|
||||||
|
for the full version*
|
38
Replay_Attacks/DeBruijn/README.md
Normal file
38
Replay_Attacks/DeBruijn/README.md
Normal file
@ -0,0 +1,38 @@
|
|||||||
|
# HackRF-Portapack Files for the DeBruijn attack!
|
||||||
|
|
||||||
|
This is a Github repository devoted to delivering to you
|
||||||
|
the required files to perform the DeBruijn attack from your HackRF-Portapack
|
||||||
|
|
||||||
|
*This is for educational purposes only.
|
||||||
|
I am in NO WAY liable for any actions executed by means of the contents within this
|
||||||
|
repository. PLEASE use responsibly.*
|
||||||
|
|
||||||
|
*If unfamiliar with the debruijn attack: this attack
|
||||||
|
transmits a single signal that contains every possible
|
||||||
|
combination of a specific bit-length in just seconds
|
||||||
|
by overlapping binary sequences*
|
||||||
|
|
||||||
|
*This attack will NOT work on devices that utilize
|
||||||
|
rollling codes*
|
||||||
|
|
||||||
|
## Prerequisites:
|
||||||
|
|
||||||
|
### Hardware:
|
||||||
|
• HackRF and Portapack
|
||||||
|
|
||||||
|
## Getting started:
|
||||||
|
|
||||||
|
Transfer these files to a folder called "DeBruijn" at the
|
||||||
|
root of your Portapack's SD card.
|
||||||
|
|
||||||
|
To perform the attack(s), simply use the "Replay" function
|
||||||
|
within the "Havoc" or "Mayhem" firmware and choose one of
|
||||||
|
these files in the "DeBruijn" folder
|
||||||
|
|
||||||
|
These files are labeled according to what type of key/remote
|
||||||
|
they are calculated for based on bit-length
|
||||||
|
|
||||||
|
Have fun, and *USE RESPONSIBLY*
|
||||||
|
|
||||||
|
*If you'd like to use trinary sequences as well, click [here](https://drive.google.com/drive/folders/182GeXBpSp3klfKB5Phci-zFITLylrn1W?usp=sharing)
|
||||||
|
for the full version*
|
@ -0,0 +1,3 @@
|
|||||||
|
version https://git-lfs.github.com/spec/v1
|
||||||
|
oid sha256:80c59db45a59e63b35564f7f18f5c8739502e3dcc8b70fe5a20899ca458ba56f
|
||||||
|
size 2078980
|
3
Replay_Attacks/Motorola/Moto(T800)SMS(TEXT_TEST).c16
Normal file
3
Replay_Attacks/Motorola/Moto(T800)SMS(TEXT_TEST).c16
Normal file
@ -0,0 +1,3 @@
|
|||||||
|
version https://git-lfs.github.com/spec/v1
|
||||||
|
oid sha256:2a656f6f20ec4385021ae05da969f58de3ae352a1619b3daf1272f5197c67e1f
|
||||||
|
size 1506416
|
2
Replay_Attacks/OpenSesame/opensesame.TXT
Normal file
2
Replay_Attacks/OpenSesame/opensesame.TXT
Normal file
@ -0,0 +1,2 @@
|
|||||||
|
sample_rate=500000
|
||||||
|
center_frequency=310000000
|
@ -0,0 +1,3 @@
|
|||||||
|
version https://git-lfs.github.com/spec/v1
|
||||||
|
oid sha256:0f1976c85ea62e4b492b993b7e07b365f9c9051b3dba801cc6104900e8b3e918
|
||||||
|
size 2084864
|
@ -0,0 +1,2 @@
|
|||||||
|
sample_rate=250000
|
||||||
|
center_frequency=457600000
|
@ -0,0 +1,9 @@
|
|||||||
|
|
||||||
|
|
||||||
|
# Basic command for HackRF transmit LRS pagers.
|
||||||
|
# Avaiable raw binary pager files will ring all pagers on designated restaurant ID setting.
|
||||||
|
|
||||||
|
# Example ring all pagers on restaurant ID 1
|
||||||
|
|
||||||
|
/usr/bin/hackrf_transfer -s 2000000 -t pager_restid_1.raw -f 467750000 -x 40
|
||||||
|
|
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Some files were not shown because too many files have changed in this diff Show More
Loading…
Reference in New Issue
Block a user