opensesame
url-image
opensesame | url-image | |
---|---|---|
7 | 1 | |
849 | 1,126 | |
0.5% | - | |
10.0 | 0.0 | |
about 4 years ago | 7 months ago | |
C | Swift | |
GNU General Public License v3.0 only | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
opensesame
-
Reverse engineering a car key fob signal
Samy Kumar did a project about 10 years back, where he worked out how to brute force a 12 bit garage door code in under 10 seconds, using a childs toy: http://samy.pl/opensesame/
My garage door opener uses a 12 but dip switch config (and my last place used an 8 dip switch config, and I'm pretty sure still does).
Re reading that OpenSesame post was fun. It reminded me of a few names I need to go find out what they're up to these days (Travis Goodspeed and Michael Ossmann are names I remember seeing doing/writing-up some really cool stuff), and that the Mattel IM-ME toy he was using uses that same CC1110 "sub gHz"
- Cloning the metacycle key
-
Time to masterkey the city. Glad I got them when I did.
At this point let's just cite his site http://samy.pl/opensesame/
-
Old garage door Liftmaster G5425, any options to add a remote?
Yes, there are only 512 combinations for a 9 bit receiver like this. More switches adds more combinations, but all of these style openers are susceptible to a "replay attack" where you record the signal from the opener and play it back later. They are also at risk of more sophisticated brute force attacks (https://samy.pl/opensesame/) Modern openers use a "rolling code" system that is safer, but the truth of the matter is that it is very very rare for anyone to exploit these old openers.
-
Do garages have rolling codes?
Functionally anything that can be attacked by OpenSesame can be programmed in, but that list is pretty small these days.
-
Any ideas? My region is, US and the freq is for my garage door.
Perhaps someone could create a flipper compatible file using this existing opensesame source code
-
opensesame plugin?
Hey all! Well, my flipper has finally arrived, and I'm delighted. I'm interested in exploring some minor development on it, and in particular was looking at trying to get samyk's opensesame attack working. As the code is all there on github, and his device used the same RF chipset. I presume it should be a relatively simple matter to get it going on the flipper, but not quite sure how to start with it, as I guess the dev docs are still only in Russian...
url-image
What are some alternatives?
stinsen - Coordinators in SwiftUI. Simple, powerful and elegant.
SwiftUIX - An exhaustive expansion of the standard SwiftUI library.
ZenTuner - A minimal chromatic tuner for iOS & macOS.
PermissionsSwiftUI - A SwiftUI package to beautifully display and handle permissions.
OpenSesame - Native and encrypted password manager for iOS and macOS.
SDWebImageSwiftUI - SwiftUI Image loading and Animation framework powered by SDWebImage
DownloadFullInstaller - macOS application written in SwiftUI that downloads installer pkgs for the Install macOS Big Sur application.
gr-keyfob - Transceiver for Hella wireless car key fobs.
Grocy-SwiftUI - A client for Grocy for macOS and iOS, written with SwiftUI
cli - The command line vault (Windows, macOS, & Linux).
ScrollViewProxy - ScrollViewProxy for SwiftUI on iOS 13 and up