ssloxford / biometric-backdoorsView external linksLinks
Code for "Biometric Backdoors: A Poisoning Attack Against Unsupervised Template Updating"
☆11Nov 29, 2021Updated 4 years ago
Alternatives and similar repositories for biometric-backdoors
Users that are interested in biometric-backdoors are comparing it to the libraries listed below
Sorting:
- Artefacts for Survivalism: Systematic Analysis of Windows Malware Living-Off-The-Land☆11Jul 7, 2021Updated 4 years ago
- CCTV Remote Code Execution Metasploit Module☆10Aug 12, 2016Updated 9 years ago
- This Project uses a Panda board mounted on top of my drone (the attacker) to hijack other drones autonomously and fly them back to the st…☆16May 20, 2014Updated 11 years ago
- Regular expression for matching .onion Tor links (v2 & v3).☆18Jan 5, 2023Updated 3 years ago
- Artifacts for SLAP: Improving Physical Adversarial Examples with Short-Lived Adversarial Perturbations☆28Oct 22, 2021Updated 4 years ago
- Pytorch implementation of Backdoor Attack against Speaker Verification☆28Sep 19, 2023Updated 2 years ago
- GSExtract is a tool for converting imperfect satellite radio captures of internet traffic transmitted using Generic Stream Encapsulation …☆83Feb 25, 2021Updated 4 years ago
- ME314 Introduction to Data Science and Big Data Analytics 2018☆10Jul 29, 2018Updated 7 years ago
- A USB RubberDucky payload that steals Wi-Fi credentials and sends them to the attacker via STMP☆10Dec 16, 2021Updated 4 years ago
- OTP-BYPASS-2022 Signaling System is an international telecommunication protocol standard that defines how the network elements in a publi…☆12Oct 10, 2022Updated 3 years ago
- Its the programmed ATM card that can hack into all ATM machines. Its works with any currency and in any country where you might be living…☆10May 15, 2016Updated 9 years ago
- Master Thesis, Software to detect IMSI-Catchers☆44Jun 13, 2024Updated last year
- Design requirements for an open-source USB-A magnetic breakaway connector used in the BusKill laptop kill cord☆41Feb 8, 2025Updated last year
- KPart for rendering Markdown content☆11Oct 9, 2020Updated 5 years ago
- DD Liberator 3D Gun Blueprint☆13May 10, 2013Updated 12 years ago
- MagTool is software for magnetic stripe readers & writers.☆15Jan 22, 2013Updated 13 years ago
- Awesome-AndroidROM: Explore the world of OEM Android Experiences! Dive into a comprehensive collection of official Android skins from ma…☆18Sep 29, 2024Updated last year
- Deep learning-based audio spoofing attack detection experiments for speaker verification.☆13Apr 20, 2023Updated 2 years ago
- TV transmitter and receiver through RTL-SDR, for educational purposes☆11Oct 27, 2017Updated 8 years ago
- a simple chat server for the esp8266.☆10May 19, 2021Updated 4 years ago
- Most powerfull Wifi Jammier.with fixes.☆12Oct 14, 2022Updated 3 years ago
- PillDucky is similar to "Hak5's Rubber Ducky" but for STM32 boards.☆15Jul 27, 2021Updated 4 years ago
- Code for the Arduino-based BadUSB inspired from the legendary Rubber Ducky from Hak5☆11Feb 28, 2023Updated 2 years ago
- Magnetic card spoofer☆12May 5, 2014Updated 11 years ago
- emv software clone datas DUMPS from original card holder to chip blank card jcop any new generation blank card☆14Oct 25, 2017Updated 8 years ago
- Samy Kamkar's Magspoof using SMD components☆16Dec 1, 2015Updated 10 years ago
- Helper library to read out the current balance of canteen cards using NFC.☆12Oct 14, 2024Updated last year
- Schematics & Firmware for self-tuning portable RF Jammer☆11Feb 2, 2018Updated 8 years ago
- This is a place for everything UK related☆10Feb 1, 2023Updated 3 years ago
- Module PMKIDAttack for WiFi Pineapple☆12Oct 6, 2022Updated 3 years ago
- Inject scripted keystrokes and mouse movements into remote desktop sessions, including VMware View, Amazon Workspaces, and Microsoft RDP.…☆17Jul 25, 2014Updated 11 years ago
- How to download Restricted Media on Telegram Web☆12Dec 14, 2022Updated 3 years ago
- Infrared based vein finder.☆12Oct 9, 2018Updated 7 years ago
- Keychain USB multiple password manager/generator/injector☆11Dec 7, 2015Updated 10 years ago
- Sources for the paper Real2Sim: Visco-elastic parameter estimation from dynamic motion (and partially also ADD: Analytically Differentiab…☆11Apr 20, 2023Updated 2 years ago
- HACK ATM MACHINES NEAREST TO YOU AND BECOME RICH!!! You can hack and break into a bank’s security ATM Machine without carrying guns or an…☆19Sep 14, 2016Updated 9 years ago
- RFCat scripts to dump HCS keeloq encoder data☆13Sep 25, 2016Updated 9 years ago
- A marketplace integrated with the Bitcoin currency☆44Jan 5, 2013Updated 13 years ago
- ☆14Feb 20, 2022Updated 3 years ago