maryammjd / Reading-sensor-data-for-fifty-4digit-PINsLinks
This code asks the user to enter fifty 4-digit PINs, each 5 times, and saves the PINs and their sensor measurements (motion and orientation) in a m-lab database. Technical details of the data collection process and the collected data are publicly available too. Please visit homepages.cs.ncl.ac.uk/m.mehrnezhad/
☆12Updated 8 years ago
Alternatives and similar repositories for Reading-sensor-data-for-fifty-4digit-PINs
Users that are interested in Reading-sensor-data-for-fifty-4digit-PINs are comparing it to the libraries listed below
Sorting:
- Tor Browser and Tails version fingerprint PoC☆137Updated 6 years ago
- ☆50Updated 11 years ago
- Bunny is a wireless. meshing, darknet that uses 802.11 to hide its communications☆930Updated 9 years ago
- Hashcrack.org GPU-accelerated password cracker☆84Updated 9 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 9 years ago
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆102Updated 8 years ago
- Various cryptographic backdoors and tools to detect them☆21Updated 9 years ago
- Android wireless karma attack detector☆66Updated 9 years ago
- A powerful and extensible wireless drop box☆267Updated 6 years ago
- Decentralized opsec panic button operating over UDP broadcasts and HTTP. Provides automatic ejection of encrypted drives as a safe-measur…☆225Updated 3 years ago
- SilverEdge Inc. SilverPush Demo Apps (unmasked)☆84Updated 9 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 10 years ago
- An experimental project to demonstrate how a user keyboard input may be sniffed through the pattern analysis of the sounds emitted by the…☆67Updated 9 years ago
- Domain cralwer for various sites/databases☆9Updated 6 years ago
- A multi service threaded MD5 cracker☆66Updated 9 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆49Updated 8 years ago
- Detect snooper on your system!☆84Updated 8 years ago
- Video steganography implementation☆99Updated 7 years ago
- Tools to help detect Hacking Team malware☆79Updated 9 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 10 years ago
- wiwo is a distributed 802.11 monitoring and injecting system that was designed to be simple and scalable, in which all workers (nodes) ca…☆94Updated 9 years ago
- 🔥 A checker site for MS15-034 / CVE-2015-1635☆38Updated 10 years ago
- Small and cheap standalone USB sanitizer☆43Updated 4 years ago
- This tool seeks asynchronously TrueCrypt key file using combinations of provided key files with provided password.☆48Updated 7 years ago
- Proof of Concept of HID26 Bruteforce☆28Updated 2 years ago
- This project contains a PoC and exploit generator for a code execution bug in Ubuntu's Apport crash reporter☆97Updated 8 years ago
- Pyxiewps is a wireless attack tool to retrieve the WPS pin in seconds.☆138Updated 5 years ago
- hid emulation tools for the usbarmory☆68Updated 8 years ago
- Scripts to create your own MITM'ing, packet sniffing WiFi access point☆144Updated 9 years ago
- my simple python scripts☆25Updated 4 months ago