Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Path: blob/master/documentation/modules/post/hardware/rftransceiver/rfpwnon.md
Views: 11789
Port of a brute force utility by Corey Harding of LegacySecurityGroup.com, the original can be found here. It's a generic AM/OOK brute forcer with PWM translations. It has been demonstrated to work against static key garage door openers.
Options
FREQ
Frequency to brute force.
BAUD
Baud rate. Default: 2000
BINLENGTH
Binary bit-length for bruteforcing. Default: 8
REPEAT
How many times to repeat the sending of the packet. Default: 5
PPAD
Binary data to append to packet. (Example: "0101") Default: None
TPAD
Binary data to add to end of packet. (Example: "0101") Default: None
RAW
Do not do PWM encoding on packet. Default: False
TRI
Use trinary signals. Default: False
EXTRAVERBOSE
Adds some extra status messages.
INDEX
USB Index number. Default: 0
DELAY
How many milliseconds to delay before transmission. Too fast tends to lock up the device. Default: 500 (0.5 seconds)
Scenarios
Run a brute force of 6 characters long with 2 repeats: