Skip to content

Instantly share code, notes, and snippets.

View ryan2625's full-sized avatar

Ryan ryan2625

View GitHub Profile
There appears to be a string encoded in the binary payload:
https://gist.github.com/q3k/af3d93b6a1f399de28fe194add452d01#file-hashes-txt-L115
Which functions as a killswitch:
https://piaille.fr/@zeno/112185928685603910
Thus, one workaround for affected systems might be to add this to `/etc/environment`:
```
@unixb0y
unixb0y / python-cc1101-ook.py
Created December 13, 2018 00:37
CC1101 OOK receiver
from digitalio import DigitalInOut
import board
import busio
from adafruit_bus_device.spi_device import SPIDevice
WRITE_SINGLE_BYTE = 0x00
WRITE_BURST = 0x40
READ_SINGLE_BYTE = 0x80
READ_BURST = 0xC0