brent-stone/CAN_Reverse_Engineering

Automated Payload Reverse Engineering Pipeline for the Controller Area Network (CAN) protocol

47
/ 100
Emerging

This project helps automotive security researchers and vehicle enthusiasts understand the hidden language of their car's internal communication system (CAN bus). It takes raw CAN bus log files as input and automatically identifies, groups, and visualizes the operational data (like engine RPM or brake pressure). The output includes organized data files, correlation matrices, and various plots, making it easier to analyze vehicle behavior and potential vulnerabilities.

440 stars. No commits in the last 6 months.

Use this if you need to systematically reverse engineer Controller Area Network (CAN) bus data from vehicles to understand proprietary messages and identify relevant signals.

Not ideal if you are looking for a plug-and-play graphical user interface for CAN data analysis without any programming knowledge.

automotive-security vehicle-diagnostics CAN-bus-analysis automotive-hacking reverse-engineering
Stale 6m No Package No Dependents
Maintenance 0 / 25
Adoption 10 / 25
Maturity 16 / 25
Community 21 / 25

How are scores calculated?

Stars

440

Forks

68

Language

Python

License

GPL-3.0

Last pushed

Apr 27, 2024

Commits (30d)

0

Get this data via API

curl "https://pt-edge.onrender.com/api/v1/quality/ml-frameworks/brent-stone/CAN_Reverse_Engineering"

Open to everyone — 100 requests/day, no key needed. Get a free key for 1,000/day.