KaraZajac

KaraZajac / KAT

Public

Keyfob Analysis Tool

35
3
100% credibility
Found Feb 18, 2026 at 21 stars -- GitGems finds repos before they trend. Get early access to the next one.
Sign Up Free
AI Analysis
Rust
AI Summary

A terminal-based tool for capturing, decoding, and replaying car keyfob radio signals using radio receivers, intended for authorized security research on personal vehicles.

How It Works

1
🔍 Discover the keyfob explorer

You hear about a free tool that lets you peek inside your car key's radio signals using a simple gadget.

2
🔌 Plug in your radio gadget

Connect a small receiver like RTL-SDR or HackRF to your computer – it works right away.

3
🚀 Launch and tune in

Open the app in your terminal; pick the car key frequency like 433 MHz and start listening.

4
🎉 Press key – magic happens!

Hold your car key near it and press lock; watch the secret signal appear live on screen.

5
🔍 Unlock the signal details

Pick the capture to see the button pressed, code, counter, and even car model hints.

6
📤 Replay or share it

With the full gadget, send the signal back to test; or save for your pocket gadget.

Master your keyfob signals

You now understand and can safely test your own car's remote security like a pro.

Sign up to see the full architecture

5 more

Sign Up Free

Star Growth

See how this repo grew from 21 to 35 stars Sign Up Free
Repurpose This Repo

Repurpose is a Pro feature

Generate ready-to-use prompts for X threads, LinkedIn posts, blog posts, YouTube scripts, and more -- with full repo context baked in.

Unlock Repurpose
AI-Generated Review

What is KAT?

KAT is a Rust-built terminal tool for key fob analysis, capturing, decoding, and replaying automotive RF signals from HackRF or RTL-SDR dongles. It handles real-world 433MHz keyfobs like Kia V0-V6, Ford, Fiat, Subaru, and VAG via a ratatui-powered TUI with VIM commands (:freq, :lock, :export). Developers get live demodulation, protocol details (serial, counter, CRC), and exports to Flipper Zero .sub or .fob JSON—perfect for authorized testing on your own cars.

Why is it gaining traction?

Its 14-protocol support with KeeLoq fallback and embedded keys stands out—no manual key hunting like in rtl_433 or Universal Radio Hacker. Transmit Lock/Unlock/Trunk/Panic directly from decodes (HackRF only), plus research mode for unknowns, hooks RF tinkerers tired of clunky GUIs. Vim-style CLI and config.ini tweaks make sessions snappy, unlike script-heavy alternatives on GitHub KAT repos.

Who should use this?

RF security researchers pentesting keyless entry on owned vehicles, car modders decoding Kia or VAG fobs, and hobbyists replaying Subaru signals for vuln hunts. Ideal for those with HackRF wanting quick TUI over Wireshark clutter, or RTL-SDR users exporting to Flipper for portable replay.

Verdict

Grab it if you're into key fob analysis—solid for niche RF work despite 19 stars and 1.0% credibility score signaling early maturity. Docs shine with legal warnings and builds are straightforward; lacks tests but ProtoPirate alignment ensures reliability. Worth forking for custom protocols.

(198 words)

Sign up to read the full AI review Sign Up Free

Similar repos coming soon.