StealthyIMU: Stealing Permission-protected Private Information From Smartphone Voice Assistant Using Zero-Permission Sensors, NDSS 2023
☆20Jan 23, 2023Updated 3 years ago
Alternatives and similar repositories for StealthyIMU
Users that are interested in StealthyIMU are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"☆14Dec 8, 2023Updated 2 years ago
- ☆11Aug 31, 2023Updated 2 years ago
- ManageEngine ADManager Command Injection☆11Oct 2, 2023Updated 2 years ago
- Exploits for CVE-2023-27327 and CVE-2023-27328☆14May 9, 2023Updated 2 years ago
- dockerfile of Acunetix Web Vulnerability Scanner14(210615184)☆14Jun 24, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Removes duplicate entries from a file, resulting in only unique parameter combinations. Useful for parsing waybackurls and making recon m…☆11May 31, 2020Updated 5 years ago
- Simple CVE-2021-20294 poc☆11Jan 21, 2023Updated 3 years ago
- Wordpress Plugin Canto < 3.0.5 - Remote File Inclusion (RFI) and Remote Code Execution (RCE)☆17Nov 24, 2023Updated 2 years ago
- PassWord List Maker☆17Oct 29, 2018Updated 7 years ago
- CVE-2023-28121 - WooCommerce Payments < 5.6.2 - Unauthenticated Privilege Escalation [ Mass Add Admin User ]☆11Jul 14, 2023Updated 2 years ago
- An OSINT tool to easily generate Facebook url's to access publicly available information from Facebook profiles☆12Feb 22, 2017Updated 9 years ago
- CVE-2022-31245: RCE and domain admin privilege escalation for Mailcow☆12Jul 25, 2022Updated 3 years ago
- Description and exploit of CVE-2023-33831 affecting FUXA web-based Process Visualization (SCADA/HMI/Dashboard) software.☆12Oct 27, 2024Updated last year
- ☆12Jan 30, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆10Jun 10, 2023Updated 2 years ago
- Trustzone Exploit that allows running code in secure mode on Surface RT (Tegra 3) with the help of Yahallo (by imbushuo)☆11Mar 30, 2023Updated 3 years ago
- A script to test for subdomain takeovers from a list of domains☆12Feb 18, 2023Updated 3 years ago
- Funny Fuzzing Wordlist☆14Jun 14, 2022Updated 3 years ago
- Web shell generation tool written in go☆12Feb 28, 2023Updated 3 years ago
- Various exploits☆10Apr 27, 2017Updated 8 years ago
- A malware payload generator that can bypass almost all antivirus. It can bypass signature detection and heuristics.☆16Mar 28, 2023Updated 3 years ago
- A simple bash script to install most used penetration testing and hacking tools on Manjaro Linux.☆12Jun 11, 2020Updated 5 years ago
- IP-Finder is an Open Source Intelligence (OSINT) tool that helps collect IPs of Companies, Servers, Operating Systems and much more. It a…☆15May 2, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Red Team list and cheat sheets☆11Jul 7, 2024Updated last year
- Remake of OSIF by CiKu370☆15Dec 17, 2020Updated 5 years ago
- Impacket is a collection of Python classes for working with network protocols.☆11Jul 5, 2023Updated 2 years ago
- A powerful pentesting tool for proactive detection and exploitation of dependency confusion vulnerabilities in Node.js projects. Enhance …☆14Jul 25, 2023Updated 2 years ago
- A tool for finding CNAME of subdomains and checking clickjacking vulnerability.☆13Jun 15, 2025Updated 9 months ago
- an Android app showing a map of cell towers you passed by the day☆16Mar 14, 2011Updated 15 years ago
- Uses the Google Places API to get the name, email-address and website of businesses☆10Sep 14, 2019Updated 6 years ago
- Automated workflow on N8N + Woovi☆14Jan 4, 2026Updated 2 months ago
- ICCV 2021 papers and code focus on adversarial attacks and defense☆11Nov 5, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A python script to extract contact names and email addresses from all messages on an IMAP server.☆15Nov 12, 2015Updated 10 years ago
- ☆14Mar 20, 2025Updated last year
- PendingIntent exploit☆11Sep 26, 2023Updated 2 years ago
- This automation protect against subdomain takeover on AWS env which also send alerts on slack.☆12Aug 1, 2021Updated 4 years ago
- Tool for viewing Android package details, including permissions, services, activities, and more.☆22Nov 30, 2012Updated 13 years ago
- Bypass CDN/WAF☆13Dec 11, 2023Updated 2 years ago
- POC for CVE-2023-24488☆14Jul 4, 2023Updated 2 years ago