Samsonsjarkal / StealthyIMU
StealthyIMU: Stealing Permission-protected Private Information From Smartphone Voice Assistant Using Zero-Permission Sensors, NDSS 2023
☆20Updated 2 years ago
Alternatives and similar repositories for StealthyIMU:
Users that are interested in StealthyIMU are comparing it to the libraries listed below
- This repository provides the implementation of the MobiCom 23 Workshop's (WiNTECH 23) paper-- Wi-BFI☆39Updated 7 months ago
- Frida script that allows to sniff & dump USB traffic on macOS☆13Updated 6 months ago
- ☆21Updated last year
- Repository for the Framing Frames publication: security context and transmit queue manipulations, client isolation bypasses, and more.☆47Updated last year
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆18Updated 2 years ago
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆12Updated 9 months ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆16Updated 3 years ago
- Another vulnerability scanner☆19Updated 3 weeks ago
- This repository is to provide a write-up and PoC for CVE-2023-41717.☆12Updated last year
- Exploits of different CVE IDs (CVE-2021-37910, CVE-2021-40288, CVE-2021-41435, CVE-2021-41436, CVE-2021-41437, CVE-2021-41441, CVE-2021-4…☆17Updated 2 years ago
- ICS attack simulator for the Tennessee Eastman Process. From the NDSS 2024 paper: "Attributions for ML-based ICS anomaly detection: From …☆13Updated last year
- Development of Botnet Detection Module for Traffic-Based IoT Devices Using Deep Learning☆14Updated 2 years ago
- ☆27Updated 3 years ago
- ☆16Updated 4 years ago
- A tool that adds reproducible UUIDs to YARA rules☆13Updated 11 months ago
- Red Team Projects with chat.openai.com.☆17Updated last year
- Predicting the probability of an exploit being released after a CVE is published (by Machine learning algorithm)☆12Updated last year
- This is a working variant of the Mirai IOT botnet☆13Updated 2 years ago
- RATs library 2003 to present☆11Updated last year
- ☆19Updated last year
- TL;DR: Mutate a binary to identify potential exploit candidates☆12Updated last year
- One-shot Recognition for Unseen Gesture with COTS WiFi☆33Updated 2 years ago
- ☆16Updated last year
- ☆13Updated last week
- Corrupted files generator. Random bits flipper.☆23Updated last year
- MacroExploit use in excel sheet☆20Updated last year
- Burp suite Certificate modification tool☆18Updated last year
- A folder to serve tools from during PT/Red Team engagements. Contains common executables and scripts for privesc, recon, pivoting and CVE…☆14Updated last year
- SecurityBsides Roma Conference Repo☆10Updated 2 years ago
- [IJCAI 2024] Imperio is an LLM-powered backdoor attack. It allows the adversary to issue language-guided instructions to control the vict…☆41Updated last month