Code for the WWW'20 paper "Nowhere to Hide: Cross-modal Identity Leakage between Biometrics and Devices"
☆23Dec 8, 2022Updated 3 years ago
Alternatives and similar repositories for CrossLeak
Users that are interested in CrossLeak are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Windows Privilege Escalation☆10Dec 27, 2014Updated 11 years ago
- A feature packed multi-hack for the first-person shooter game Insurgency☆18Mar 15, 2017Updated 9 years ago
- Extract most frequent words in a list of subdomains☆13Feb 15, 2025Updated last year
- Some tools for EFI hackery☆41Feb 25, 2012Updated 14 years ago
- Websocket client API for AutoHotKey and other scripting and programming languages.☆13Jun 17, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- BOR - Break On Request, is a burp extension that provides a custom context menu for marking requests to be stopped by the interceptor wit…☆13Nov 18, 2022Updated 3 years ago
- Xposed Framework module to skip authentication on "Quickly open camera" gesture.☆22Sep 18, 2021Updated 4 years ago
- Simple socket-based gateway to the Burp Collaborator☆34Nov 23, 2016Updated 9 years ago
- Software project☆12Jun 21, 2022Updated 3 years ago
- Open source tools mentioned in Advanced Penetration Testing Hacking the World's Most Secure Networks☆11Feb 12, 2018Updated 8 years ago
- Neverwinter Invoke Bot☆20Jan 21, 2020Updated 6 years ago
- Assembly examples for x86-64 System V☆23Jun 28, 2020Updated 5 years ago
- Burp Suite extension for extracting metadata from files☆20Dec 29, 2020Updated 5 years ago
- Supplement to radare2-explorations.☆35Jan 4, 2017Updated 9 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- String-based secret-searching tool (high entropy and regexes) based on truffleHog☆17Oct 21, 2021Updated 4 years ago
- CryptoWall 3.0 Ransomware Reversing Documentation & Scripts☆17Nov 24, 2020Updated 5 years ago
- A tool for pulling top-10 cves from cvetrend.com. ;)☆14Aug 4, 2022Updated 3 years ago
- ☆14Mar 8, 2023Updated 3 years ago
- Aranea is a fast and clean dns spoofing tool.☆17Sep 20, 2011Updated 14 years ago
- Simple and old virtual machine☆17Apr 28, 2016Updated 10 years ago
- CVE-2017-7529_PoC☆19Jan 7, 2026Updated 4 months ago
- ☆28Apr 1, 2018Updated 8 years ago
- source of: https://www.unknowncheats.me/forum/grand-theft-auto-v/300630-onra2s-mini-external-cheat-billion-dollar-earnings-godmode-etc-gt…☆11Jul 22, 2019Updated 6 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- 一个fuzzdb扩展库 弱密码和各语言网站后台/漏洞/备份文件路径☆13Feb 10, 2019Updated 7 years ago
- 基于zoomeye的思路制作的小型空间引擎及攻击模型☆16Jun 4, 2017Updated 8 years ago
- receive and draw primitives with SwapBuffers hook and imgui☆12Oct 15, 2020Updated 5 years ago
- ☆26Jun 11, 2022Updated 3 years ago
- Code for blogpost: https://outflank.nl/blog/2018/10/25/building-resilient-c2-infrastructues-using-dns-over-https/☆54Oct 25, 2018Updated 7 years ago
- My Aliucord Plugins☆21Jul 17, 2022Updated 3 years ago
- Automatically skip sponsor segments in YouTube videos playing on Chromecast.☆15Feb 23, 2026Updated 2 months ago
- ☆51Sep 7, 2017Updated 8 years ago
- HackSys Extreme Vulnerable Driver - StackOverflow Exploit☆32Jan 9, 2017Updated 9 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- config files...☆12Aug 30, 2020Updated 5 years ago
- [UNOFFICIAL MIRROR] Automatic Win32 binary obfuscator☆47Apr 6, 2015Updated 11 years ago
- ☆17Mar 21, 2019Updated 7 years ago
- New handle stealing technique for windows apps☆14Oct 6, 2017Updated 8 years ago
- pwn☆12Apr 7, 2019Updated 7 years ago
- Bypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler☆30Jul 12, 2021Updated 4 years ago
- The open source implementation of "NeVA: NeMo Vision and Language Assistant"☆17Aug 26, 2023Updated 2 years ago