soheil / DeepKeyAttackLinks
Deep learning model classifying keyboard strokes via phone microphone/Zoom, identifying security threats (Accuracy: 95%)
☆47Updated 2 years ago
Alternatives and similar repositories for DeepKeyAttack
Users that are interested in DeepKeyAttack are comparing it to the libraries listed below
Sorting:
- A public repo for the datasets recorded as part of "A Practical Deep Learning-Based Acoustic Side Channel Attack on Keyboards".☆30Updated 2 years ago
- Random tidbits.☆13Updated 5 months ago
- Drone Swarmer is an ESP8266 device based on RemoteIDSpoofer that spoofs "ghost" drones by exploiting an Open Drone ID vulnerability using…☆64Updated 4 months ago
- A novel human-interaction method for real-time speech extraction on headphones.☆595Updated last year
- ☆60Updated 2 years ago
- BioLAb in home to measure EEG, EMG, EKG, EOG, PPG☆47Updated 6 months ago
- ☆75Updated last year
- BLE pentesting scripts☆117Updated 2 months ago
- Using of the WiFi signal in combination with deep learning architectures, commonly used in computer vision, to estimate dense human pose …☆208Updated 2 years ago
- A fault injection toolkit based on ESP8266 for glitching electronic circuits. It's low-cost, reliable and can be built anywhere.☆43Updated 7 months ago
- LLM based autonomous agent that does online comprehensive research on any given topic☆13Updated last year
- The Bird Sweeper chases birds away but does not hurt them. It is an effective and humane bird deterrent.☆20Updated 2 years ago
- Hardware and software for a man-in-the-middle DNS cache poisoning attack on an Ethernet network☆38Updated last year
- ☆20Updated last year
- Pothole Computer Vision Project☆19Updated 9 months ago
- Resources of capibaraZero(PCB, STL...)☆91Updated 10 months ago
- Raspberry Pi Software-Defined Radio Transmitter Toolkit☆85Updated 4 months ago
- Single- and Multi-Speaker Cloned Voice Detection: From Perceptual to Learned Features☆39Updated 2 years ago
- Use the ESP32 wifi 802.11 radio as a bistatic radar based on multipath interference. Will detect human intruders when they cross the path…☆61Updated 3 years ago
- A toolkit for detecting and protecting against vulnerabilities in Large Language Models (LLMs).☆151Updated 2 years ago
- A compact and portable WiFi reconnaissance suite based on the ESP8266☆119Updated 3 years ago
- NFC APDU Runner is a Flipper Zero application for reading and executing APDU commands on NFC cards. This application allows users to load…☆54Updated 6 months ago
- BioCPPNet: Automatic Bioacoustic Source Separation with Deep Neural Networks☆72Updated last year
- Proxy tool that bridges the gap between the Sniffle Bluetooth 5 long range extended sniffing and Kismet's ANTSDR capture mechanism. This …☆18Updated last year
- An Implementation of LoRa for EmComm (Emergency Communication) or (TacComm) Tactical Communication☆19Updated 5 months ago
- Code for "Biometric Backdoors: A Poisoning Attack Against Unsupervised Template Updating"☆11Updated 4 years ago
- Linux based WiFi pentesting device for the Flipper Zero.☆186Updated 3 weeks ago
- A 2.4GHz band and WiFi analyzer toolkit made with the D1 Mini and NRF24L01☆45Updated 3 years ago
- Enhanced Rayhunter Fork - 3x Cellular Data Coverage for IMSI Catcher Detection☆24Updated 5 months ago
- Pipeline of a keylogging attack using just an audio signal and unsupervised learning.☆154Updated 3 years ago