Maldrone: Exploring the Dark Side of Aerial Autonomy

Inspired by the pioneering work of fb1h2s, Maldrone is an independent deep-dive into hijacking drone systems through persistent ARM-based backdoors. Originally crafted for Parrot AR drones, this research dissects vulnerabilities in drone control software and explores how malicious actors could override autopilot logic and gain wireless root control.

Core Innovation
Maldrone implants a persistent reverse shell into the drone’s ARM Linux OS, bypassing onboard control systems and injecting remote operator commands. Once triggered, it disables the autopilot module, intercepts sensor data, and establishes full payload interaction—allowing unauthorized remote access within wireless range.
Acknowledgment
This project was independently recreated and extended based on original research by cybersecurity expert Rahul Sasi, who first introduced Maldrone as a concept. The goal is to promote awareness of UAV exploitation risks and advocate for stronger embedded drone security.
Maldrone demo 1
Maldrone terminal reverse shell
Drone software hijack illustration