Samsonsjarkal / StealthyIMULinks
StealthyIMU: Stealing Permission-protected Private Information From Smartphone Voice Assistant Using Zero-Permission Sensors, NDSS 2023
☆20Updated 2 years ago
Alternatives and similar repositories for StealthyIMU
Users that are interested in StealthyIMU are comparing it to the libraries listed below
Sorting:
- ICS attack simulator for the Tennessee Eastman Process. From the NDSS 2024 paper: "Attributions for ML-based ICS anomaly detection: From …☆13Updated last year
- A folder to serve tools from during PT/Red Team engagements. Contains common executables and scripts for privesc, recon, pivoting and CVE…☆14Updated last year
- ☆27Updated 3 years ago
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆14Updated last year
- This repository provides the implementation of the MobiCom 23 Workshop's (WiNTECH 23) paper-- Wi-BFI☆40Updated 9 months ago
- Frida script that allows to sniff & dump USB traffic on macOS☆13Updated 8 months ago
- A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticat…☆8Updated last year
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆12Updated 11 months ago
- This repository is to provide a write-up and PoC for CVE-2023-41717.☆12Updated last year
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆18Updated last year
- [IJCAI 2024] Imperio is an LLM-powered backdoor attack. It allows the adversary to issue language-guided instructions to control the vict…☆42Updated 3 months ago
- ☆16Updated 4 years ago
- Repository for the Framing Frames publication: security context and transmit queue manipulations, client isolation bypasses, and more.☆47Updated last year
- An Exploitation script developed to exploit the CVE-2023-4966 bleed citrix information disclosure vulnerability☆8Updated last year
- It's a handy tool to help you analyze malware. You can use this tool to query your malware samples using different hashes or find all oth…☆15Updated 2 years ago
- ☆22Updated last year
- Exploits of different CVE IDs (CVE-2021-37910, CVE-2021-40288, CVE-2021-41435, CVE-2021-41436, CVE-2021-41437, CVE-2021-41441, CVE-2021-4…☆17Updated 2 years ago
- keep watching new bug bounty (vulnerability) postings.☆13Updated last year
- Burp suite Certificate modification tool☆18Updated 2 years ago
- SecurityBsides Roma Conference Repo☆10Updated 2 years ago
- AI modular structure that provides automation-based attack and penetration☆14Updated last year
- Volatility 3 plugins to extract a module as complete as possible☆12Updated last year
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆18Updated 2 years ago
- ☆7Updated last year
- ☆13Updated last year
- This is a working variant of the Mirai IOT botnet☆13Updated 2 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆14Updated 4 years ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆16Updated 3 years ago
- Exploit Proof-of-Concept code for XAMPP v3.3.0 — '.ini' Buffer Overflow (Unicode + SEH)☆15Updated last year
- Predicting the probability of an exploit being released after a CVE is published (by Machine learning algorithm)☆12Updated last year