Samsonsjarkal / StealthyIMU
StealthyIMU: Stealing Permission-protected Private Information From Smartphone Voice Assistant Using Zero-Permission Sensors, NDSS 2023
☆20Updated 2 years ago
Alternatives and similar repositories for StealthyIMU:
Users that are interested in StealthyIMU are comparing it to the libraries listed below
- Source code for paper "Breaking Security-Critical Voice Authentication".☆10Updated last year
- ICS attack simulator for the Tennessee Eastman Process. From the NDSS 2024 paper: "Attributions for ML-based ICS anomaly detection: From …☆13Updated last year
- ☆21Updated last year
- Frida script that allows to sniff & dump USB traffic on macOS☆13Updated 4 months ago
- A folder to serve tools from during PT/Red Team engagements. Contains common executables and scripts for privesc, recon, pivoting and CVE…☆15Updated 10 months ago
- Repo for MobiCom 2022 paper: " Cosmo: Contrastive Fusion Learning with Small Data for Multimodal Human Activity Recognition ".☆46Updated last year
- ☆27Updated 3 years ago
- This repository provides the implementation of the MobiCom 23 Workshop's (WiNTECH 23) paper-- Wi-BFI☆37Updated 5 months ago
- Hodor for node.js☆13Updated last year
- [IJCAI 2024] Imperio is an LLM-powered backdoor attack. It allows the adversary to issue language-guided instructions to control the vict…☆41Updated 9 months ago
- A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticat…☆10Updated 8 months ago
- ☆12Updated 5 months ago
- redteaming a simple language model like gpt2. based on anthropic redteaming paper☆9Updated 2 years ago
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆12Updated last year
- This repository is to provide a write-up and PoC for CVE-2023-41717.☆13Updated last year
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated 9 months ago
- It's a handy tool to help you analyze malware. You can use this tool to query your malware samples using different hashes or find all oth…☆15Updated last year
- Only for educational purposes☆11Updated last year
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7Updated 2 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated last year
- keep watching new bug bounty (vulnerability) postings.☆12Updated 9 months ago
- bypassing the twitter safety link firewall :)☆12Updated 10 months ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆15Updated 3 years ago
- ☆13Updated last year
- Another vulnerability scanner☆17Updated last year
- SocialPwned is an OSINT tool that allows to get the emails, from a target, published in social networks such as Instagram, Linkedin and T…☆11Updated 2 years ago
- Directory with Bluetooth exploits that is used in BlueToolkit☆10Updated 4 months ago
- ☆12Updated 10 months ago