maryammjd / Reading-sensor-data-for-fifty-4digit-PINs
This code asks the user to enter fifty 4-digit PINs, each 5 times, and saves the PINs and their sensor measurements (motion and orientation) in a m-lab database. Technical details of the data collection process and the collected data are publicly available too. Please visit homepages.cs.ncl.ac.uk/m.mehrnezhad/
☆12Updated 8 years ago
Alternatives and similar repositories for Reading-sensor-data-for-fifty-4digit-PINs
Users that are interested in Reading-sensor-data-for-fifty-4digit-PINs are comparing it to the libraries listed below
Sorting:
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆101Updated 8 years ago
- Android wireless karma attack detector☆66Updated 9 years ago
- Various cryptographic backdoors and tools to detect them☆21Updated 9 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 9 years ago
- Decentralized opsec panic button operating over UDP broadcasts and HTTP. Provides automatic ejection of encrypted drives as a safe-measur…☆225Updated 3 years ago
- Hashcrack.org GPU-accelerated password cracker☆84Updated 9 years ago
- A OS X crypto ransomware PoC☆87Updated 9 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 9 years ago
- Advanced HTTP fingerprinting PoC☆44Updated 8 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- Tools to help detect Hacking Team malware☆79Updated 9 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- Tools for attacking cryptographic implementations.☆21Updated 8 years ago
- Proof-of-concept exploit code for CVE-2016-5696☆74Updated 8 years ago
- Simple reverse ICMP shell☆41Updated 11 years ago
- ☆12Updated 8 years ago
- A hacked together PHP shell designed to be stealthy and portable☆52Updated 11 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆144Updated 9 years ago
- ☆54Updated 11 years ago
- Tor Browser and Tails version fingerprint PoC☆136Updated 6 years ago
- Scripts to create your own MITM'ing, packet sniffing WiFi access point☆143Updated 9 years ago
- Password manager for USB Armory☆36Updated 9 years ago
- Proof of Concept code for CVE-2016-5696☆101Updated 8 years ago
- iSEC Partners' research publications☆76Updated 8 years ago
- Install script for grsecurity for Debian environments☆59Updated 9 years ago
- everything that does not fit elsewhere☆12Updated 7 years ago
- Windows Crypt API hook to generate weak keys☆48Updated 8 years ago
- a MITM attack tool☆85Updated 9 years ago
- PoC app for raw pdu manipulation on Android.☆120Updated 9 years ago
- TOR Mail encrypted server for Hidden Services☆40Updated 8 years ago