ssloxford / biometric-backdoors
Code for "Biometric Backdoors: A Poisoning Attack Against Unsupervised Template Updating"
☆12Updated 2 years ago
Related projects: ⓘ
- StealthyIMU: Stealing Permission-protected Private Information From Smartphone Voice Assistant Using Zero-Permission Sensors, NDSS 2023☆17Updated last year
- A tool for SigOver, signal overshadowing attack on the LTE broadcast signals in physical domain.☆32Updated 2 years ago
- The Covert Channel Educational Analysis Protocol (CCEAP) is a network protocol designed for teaching covert channels to professionals and…☆10Updated last year
- Implementation of the key recovery attack against GEA-1 keys (Eurocrypt 2021)☆47Updated 2 years ago
- Apply Machine Learning and Game Theory to improve the security of the Turris network of CZ.NIC☆23Updated 4 years ago
- Docker Implementation for srsRANProject☆35Updated 2 years ago
- Wireless Miniaturized Device☆18Updated 6 years ago
- A tool to infer the security handshake state machine of a given WiFi router. Useful for vulnerability analysis☆15Updated last year
- Z-Wave Packet Interception and Injection Tool☆34Updated 8 years ago
- Scapytain is a web application that enables you to store, organise and run test campaigns on top of Scapy.☆18Updated 6 years ago
- Android application which allows sending SMS, with a specific SMSC without changing system defaults.☆12Updated 10 years ago
- Open source SDR LTE software suite☆17Updated 6 years ago
- SimBrush - SIM data carver and wrapper☆19Updated 12 years ago
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆40Updated 4 years ago
- Code and datasets for the paper entitled "Non-cooperative 802.11 MAC layer fingerprinting and tracking of mobile devices".☆31Updated 6 years ago
- Scan for giveaways of fake Mobile Base Stations to detect them.☆20Updated 8 years ago
- evil mass storage *AT90USBKEY2 (poc-malware-tool for offline system)☆29Updated last year
- The great patator tool compiled for Windows☆24Updated 7 years ago
- A Tamarin model and analysis of EMV☆28Updated 3 years ago
- Generic cracker example which is compatible with Hashtopolis☆21Updated 3 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Updated 7 years ago
- This repository contains a set of InternalBlue patches for the BCM4375B1 Bluetooth controller, allowing to sniff and inject Zigbee, Mosar…☆19Updated 3 years ago
- A simple bash script that converts pcapng capture files to Wigle compatible csv import☆10Updated 2 years ago
- some scripts to get imsi with gsm☆16Updated 8 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆24Updated 7 years ago
- Easily Expandable Wireless Intrusion Detection System☆31Updated 3 years ago
- ☆20Updated 2 years ago
- Board layout☆13Updated 9 years ago
- ARP Man-in-the-Middle tool☆27Updated 4 years ago
- Some stuff about telecom security☆14Updated 8 years ago
- Complete SMS packet manipulation☆100Updated 2 years ago