Reliable soft-kill
that works
01
Precision Interception, Zero Delay
Indrajaal Repulsor is a portable GNSS spoofing device that quietly seizes control of rogue drones — without ever firing a shot.

02
Engineered for One Job: Winning
Repulsor doesn’t just disrupt drones — it deceives them. Here's how it quietly neutralizes airborne threats:
4km Effective Radius
Covers wide areas with precision GNSS spoofing, adjustable via power and antenna config.
Predictable Flight Control
Failsafe Instability
n less stable drones, the spoofed signal can overload the flight controller, causing a crash.
Portable & Platform-Agnostic
Mountable on towers, trucks, or tripods. Operational in seconds. Zero signature footprint.
03
Spoofing vs Jamming: What's the Difference?
Soft denial via RF jamming is temporary. Soft kill through GNSS spoofing changes the game.
Aspect | RF Jamming | GNSS Spoofing (Repulsor) |
---|---|---|
Effect | Blocks communication & control signals | Feeds false location data to drone |
Stealth | Disrupts flight temporarily | Hijacks navigation logic |
Outcome | Detectable interference | Silent, hard to detect |
Interference Risk | High – may disrupt friendly systems | Low – doesn’t affect comms |
Precision Control | Low – only disrupts signals | Low – doesn’t affect comms |
Silent Control. Maximum Disruption.
04
Versatile protection across land, sea, and temporary conflict zones.
Convoy Security
Mount Repulsor on moving vehicles to secure ground assets on the move.
Temporary No-Fly Zones
Rapidly deny access over VIP events, field camps, or mobile command posts.
Border & Coastal Outposts
Cover gaps in permanent systems with flexible, precision-based deterrence.
Critical Infrastructure Buffer
Defend radar stations, fuel depots, or surveillance nodes with clean, silent spoofing.
05
Defend Without Detection
Repulsor redefines perimeter defense — no noise, no warning, no escape.
It doesn’t disrupt. It takes over.
Looking for a different defense need?
Discover our Infra and Military solutions—tailored for complex environments and specialized threats like swarm drones, dark drones, and FPVs.