brent-stone/CAN_Reverse_Engineering
Automated Payload Reverse Engineering Pipeline for the Controller Area Network (CAN) protocol
This project helps automotive security researchers and vehicle enthusiasts understand the hidden language of their car's internal communication system (CAN bus). It takes raw CAN bus log files as input and automatically identifies, groups, and visualizes the operational data (like engine RPM or brake pressure). The output includes organized data files, correlation matrices, and various plots, making it easier to analyze vehicle behavior and potential vulnerabilities.
440 stars. No commits in the last 6 months.
Use this if you need to systematically reverse engineer Controller Area Network (CAN) bus data from vehicles to understand proprietary messages and identify relevant signals.
Not ideal if you are looking for a plug-and-play graphical user interface for CAN data analysis without any programming knowledge.
Stars
440
Forks
68
Language
Python
License
GPL-3.0
Category
Last pushed
Apr 27, 2024
Commits (30d)
0
Get this data via API
curl "https://pt-edge.onrender.com/api/v1/quality/ml-frameworks/brent-stone/CAN_Reverse_Engineering"
Open to everyone — 100 requests/day, no key needed. Get a free key for 1,000/day.
Higher-rated alternatives
GACWR/OpenUBA
A robust, and flexible open source User & Entity Behavior Analytics (UEBA) framework used for...
nfstream/nfstream
NFStream: a Flexible Network Data Analysis Framework.
echowei/DeepTraffic
Deep Learning models for network traffic classification
faucetsdn/poseidon
Poseidon is a python-based application that leverages software defined networks (SDN) to acquire...
CESNET/cesnet-datazoo
CESNET DataZoo: A toolset for large network traffic datasets