✈️ A device that detects for aircraft spoofing by monitoring for malicious ADS-B signals in the 1090MHz frequency. Built using a Raspberry Pi 3B and a FlightAware SDR
Fly Catcher monitors for malicious ADS-B signals in the 1090MHz frequency to detect for aircraft spoofing
Learn More | Build Guide | Getting Started | Video | Research Paper | Article
Picture of the completed build |
Device shown with the SportCruiser |
Display shown on the TFT Screen |
Watch the video overview of Fly Catcher on YouTube
https://youtube.com/watch?v=NJ9ep0IlddA
https://www.stuffaboutcode.com/2015/11/raspberry-pi-piaware-aircraft-radar.html
Clone the Repository on the Pi
git clone https://github.com/ANG13T/fly-catcher.git
Run the Program
python3 fly-catcher/device-rpi/piawareradar.py longitude latitude
Replace longitude and latitude with your geo-coordinates
git clone https://github.com/ANG13T/fly-catcher.git
cd notebook
jupyter notebook
Install Jupyter Notebook if you do not have it
http://localhost:8888
Visit the IP address of the Raspberry Pi device followed by the path /data/aircraft.json
For example, 192.168.1.114:8080/data/aircraft.json
Fly_Catcher.ipynb
and Run the NotebookTo get a more in-depth and technical overview of Fly Catcher, you can refer to this research paper.
You can also read an article write-up I made about Fly Catcher here.
Fly Catcher is open to any contributions. Please fork the repository and make a pull request with the features or fixes you want to implement.
The Fly Catcher leveraged on previous ADS-B works and references included below
If you enjoyed Fly Catcher, please consider becoming a sponsor in order to fund my future projects.
To check out my other works, visit my GitHub profile.