maryammjd / Reading-sensor-data-for-fifty-4digit-PINs
This code asks the user to enter fifty 4-digit PINs, each 5 times, and saves the PINs and their sensor measurements (motion and orientation) in a m-lab database. Technical details of the data collection process and the collected data are publicly available too. Please visit homepages.cs.ncl.ac.uk/m.mehrnezhad/
☆12Updated 8 years ago
Alternatives and similar repositories for Reading-sensor-data-for-fifty-4digit-PINs:
Users that are interested in Reading-sensor-data-for-fifty-4digit-PINs are comparing it to the libraries listed below
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- Domain cralwer for various sites/databases☆9Updated 6 years ago
- Android wireless karma attack detector☆66Updated 9 years ago
- TOR Mail encrypted server for Hidden Services☆40Updated 8 years ago
- Decentralized opsec panic button operating over UDP broadcasts and HTTP. Provides automatic ejection of encrypted drives as a safe-measur…☆225Updated 3 years ago
- Simple reverse ICMP shell☆41Updated 11 years ago
- Bruteforces [.onion] domains☆80Updated 9 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 9 years ago
- A Quick POC To Show Why You Should Disable/Cover Your Webcam☆19Updated 8 years ago
- Hashcrack.org GPU-accelerated password cracker☆84Updated 9 years ago
- A OS X crypto ransomware PoC☆88Updated 9 years ago
- A multi service threaded MD5 cracker☆66Updated 8 years ago
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆53Updated 7 years ago
- wiwo is a distributed 802.11 monitoring and injecting system that was designed to be simple and scalable, in which all workers (nodes) ca…☆93Updated 9 years ago
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆101Updated 8 years ago
- DNS tunnel☆60Updated 11 years ago
- Advanced Controller/Server/Client Reverse Shell/Bot – Windows/Linux – Python☆68Updated 9 years ago
- SSH Man In The Middle proxy with credentials interception, asciinema session replay, ...☆23Updated 7 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- Auto Reaver - multiple access point attack using Reaver☆53Updated 8 years ago
- Various cryptographic backdoors and tools to detect them☆21Updated 9 years ago
- ☆12Updated 8 years ago
- YAPDNS☆39Updated 9 years ago
- This tool seeks asynchronously TrueCrypt key file using combinations of provided key files with provided password.☆48Updated 7 years ago
- Proof-of-concept exploit code for CVE-2016-5696☆73Updated 8 years ago
- Broadcast Anonymous Routing - A scalable system for efficient anonymous communications☆76Updated 9 years ago
- A hacked together PHP shell designed to be stealthy and portable☆52Updated 11 years ago
- Scripts to create your own MITM'ing, packet sniffing WiFi access point☆143Updated 9 years ago
- PoC for getting remote HTTP Server date using gzip compressed HTTP Response☆56Updated 9 years ago
- Automatic backdooring apk with meterpreter (PoC)☆51Updated 8 years ago