Samsonsjarkal / StealthyIMULinks
StealthyIMU: Stealing Permission-protected Private Information From Smartphone Voice Assistant Using Zero-Permission Sensors, NDSS 2023
☆20Updated 2 years ago
Alternatives and similar repositories for StealthyIMU
Users that are interested in StealthyIMU are comparing it to the libraries listed below
Sorting:
- ☆21Updated last year
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆30Updated 3 years ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆17Updated 3 years ago
- ICS attack simulator for the Tennessee Eastman Process. From the NDSS 2024 paper: "Attributions for ML-based ICS anomaly detection: From …☆13Updated last year
- ☆8Updated 2 years ago
- Multi-Agent System for Automated Penetration Testing (MASAPT)☆28Updated 3 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆12Updated 3 years ago
- [IJCAI 2024] Imperio is an LLM-powered backdoor attack. It allows the adversary to issue language-guided instructions to control the vict…☆42Updated 5 months ago
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 4 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated 2 years ago
- A folder to serve tools from during PT/Red Team engagements. Contains common executables and scripts for privesc, recon, pivoting and CVE…☆15Updated last year
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆15Updated last year
- Enumeration & fingerprint tool☆25Updated last year
- This repository is to provide a write-up and PoC for CVE-2023-41717.☆12Updated last year
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆18Updated 2 years ago
- A wrapper around the Proxmark3 client that will alert the user of specific events☆30Updated 4 years ago
- redteaming a simple language model like gpt2. based on anthropic redteaming paper☆9Updated 2 years ago
- Fetch information about a public Google document.☆13Updated last year
- ☆17Updated 2 years ago
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆12Updated last year
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- SecurityBsides Roma Conference Repo☆10Updated 2 years ago
- Directory with Bluetooth exploits that is used in BlueToolkit☆15Updated 3 weeks ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7Updated 3 years ago
- Burp suite Certificate modification tool☆18Updated 2 years ago
- This is a simple Python script that connects to a MISP instance and retrieves attributes of specific types (such as IP addresses, URLs, a…☆16Updated 2 years ago
- Command and Control Framework☆13Updated last year
- Useful note☆16Updated 4 months ago
- keep watching new bug bounty (vulnerability) postings.☆13Updated last year
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Updated 10 months ago