ghPRao / IoT_Malware_AttacksView external linksLinks
Predicting Internet of Things(IoT) Malware Attacks. Door Bells, Thermostats, Baby Monitors, Web Cameras, and Security Cameras attacked by Mirai and Bashlite bots.
☆15Feb 21, 2021Updated 4 years ago
Alternatives and similar repositories for IoT_Malware_Attacks
Users that are interested in IoT_Malware_Attacks are comparing it to the libraries listed below
Sorting:
- The Smart Security System For Homes using Internet of Things has been experimentally proven to work satisfactorily by connecting simple a…☆15Oct 31, 2022Updated 3 years ago
- A fork of a fork of bray's abandoned umamusume auto trainer bot. With focus on being cool and completely hands off.☆19Jan 24, 2026Updated 3 weeks ago
- Intuitionistic Fuzzy Broad Learning System: Enhancing Robustness Against Noise and Outliers☆11Oct 26, 2025Updated 3 months ago
- Botnet detection on IoT Devices☆30Mar 7, 2021Updated 4 years ago
- Convolutional Neural Network (CNN) was trained on 48x48 pixel grayscale images to predict 5 different emotions from images. Ten different…☆11Sep 21, 2022Updated 3 years ago
- A multi-task learning method for multi-energy load forecasting based on synthesis correlation analysis and load participation factor☆13Aug 18, 2023Updated 2 years ago
- This project optimizes EV charging station placement and capacity using MATLAB. It calculates optimal locations based on voltage stabilit…☆16Oct 10, 2024Updated last year
- Its the programmed ATM card that can hack into all ATM machines. Its works with any currency and in any country where you might be living…☆10May 15, 2016Updated 9 years ago
- ☆11May 1, 2021Updated 4 years ago
- A USB RubberDucky payload that steals Wi-Fi credentials and sends them to the attacker via STMP☆10Dec 16, 2021Updated 4 years ago
- To predict the air quality index using meterological data using machine learning algorithms and LSTM(Long Short Term Memory)☆10Oct 3, 2019Updated 6 years ago
- Predicting train delay using previous weather and delay information of trains☆11Oct 25, 2017Updated 8 years ago
- emv software clone datas DUMPS from original card holder to chip blank card jcop any new generation blank card☆14Oct 25, 2017Updated 8 years ago
- Code for the Arduino-based BadUSB inspired from the legendary Rubber Ducky from Hak5☆11Feb 28, 2023Updated 2 years ago
- PillDucky is similar to "Hak5's Rubber Ducky" but for STM32 boards.☆15Jul 27, 2021Updated 4 years ago
- This is the accompanying repository to the paper: "Day-ahead net load forecasting with self-attention: dealing with meter and meta data u…☆10Jul 17, 2024Updated last year
- Source code for the paper titled: "Unlocking the full potential of smart charging: Addressing paused and delayed charging problems in ele…☆11May 22, 2024Updated last year
- Emergency Vehicle Smart Grid to provide faster movement to emergency vehicles.☆11Dec 12, 2019Updated 6 years ago
- Module PMKIDAttack for WiFi Pineapple☆12Oct 6, 2022Updated 3 years ago
- 网络安全程序设计相关实验-基于OpenSSL的安全聊天系统☆10Feb 18, 2023Updated 2 years ago
- ☆13Aug 14, 2020Updated 5 years ago
- Short-Term Probabilistic Load Forecasting at Low Aggregation Levels Using Convolutional Neural Networks☆10Sep 19, 2019Updated 6 years ago
- Undergraduate Research Project looking into Scheduling Optimization for Electric Vehicle Charging☆12Jun 7, 2013Updated 12 years ago
- Most powerfull Wifi Jammier.with fixes.☆12Oct 14, 2022Updated 3 years ago
- TV transmitter and receiver through RTL-SDR, for educational purposes☆11Oct 27, 2017Updated 8 years ago
- Python tool for exploiting CVE-2021-35616☆11Dec 3, 2021Updated 4 years ago
- Samy Kamkar's Magspoof using SMD components☆16Dec 1, 2015Updated 10 years ago
- Infrared based vein finder.☆12Oct 9, 2018Updated 7 years ago
- Inject scripted keystrokes and mouse movements into remote desktop sessions, including VMware View, Amazon Workspaces, and Microsoft RDP.…☆17Jul 25, 2014Updated 11 years ago
- Schematics & Firmware for self-tuning portable RF Jammer☆11Feb 2, 2018Updated 8 years ago
- Magnetic card spoofer☆12May 5, 2014Updated 11 years ago
- Short-term load forecasting with machine learning☆10Nov 11, 2021Updated 4 years ago
- Helper library to read out the current balance of canteen cards using NFC.☆12Oct 14, 2024Updated last year
- Scheduling Strategy of Electric Vehicle Charging Considering Different Requirements of Power Grid and Users☆10Apr 16, 2021Updated 4 years ago
- MagTool is software for magnetic stripe readers & writers.☆15Jan 22, 2013Updated 13 years ago
- Deep learning-based audio spoofing attack detection experiments for speaker verification.☆13Apr 20, 2023Updated 2 years ago
- Keychain USB multiple password manager/generator/injector☆11Dec 7, 2015Updated 10 years ago
- A Python implementation of improved Label Propagation Algorithm.☆11May 26, 2021Updated 4 years ago
- Traffic dataset for pems04 and pems08☆10Dec 22, 2025Updated last month