zjzsliyang / CrossLeakView external linksLinks
Code for the WWW'20 paper "Nowhere to Hide: Cross-modal Identity Leakage between Biometrics and Devices"
☆23Dec 8, 2022Updated 3 years ago
Alternatives and similar repositories for CrossLeak
Users that are interested in CrossLeak are comparing it to the libraries listed below
Sorting:
- Some tools for EFI hackery☆41Feb 25, 2012Updated 13 years ago
- ATT&CK技战术数据☆15Feb 8, 2021Updated 5 years ago
- DigitalTwinSocCyberrange is a research project by the University of Regensburg and the Ionian University. This prototype aims to provide …☆11Apr 22, 2022Updated 3 years ago
- Simple and old virtual machine☆17Apr 28, 2016Updated 9 years ago
- 3G/4G/5G authentication test troubleshooting tool☆61May 11, 2020Updated 5 years ago
- ☆28Apr 1, 2018Updated 7 years ago
- HackSys Extreme Vulnerable Driver - StackOverflow Exploit☆32Jan 9, 2017Updated 9 years ago
- Revised shell script for parsing .gnmap, .xml, or .nmap port scan results files to a CSV list, lists of IPs per port, web urls, and a sum…☆13Apr 17, 2020Updated 5 years ago
- Supplement to radare2-explorations.☆34Jan 4, 2017Updated 9 years ago
- Simple socket-based gateway to the Burp Collaborator☆34Nov 23, 2016Updated 9 years ago
- beacon,aggressor-scripts,cna,cobalt-strike,email☆36Jun 18, 2019Updated 6 years ago
- DJI Assistant 2 web socket server exploitation tools☆37Mar 7, 2018Updated 7 years ago
- R package for working with data stored within VERIS framework☆13Dec 22, 2015Updated 10 years ago
- ☆12Oct 1, 2024Updated last year
- Common Proprietary Qualcomm Binaries☆10Dec 26, 2016Updated 9 years ago
- Android lockscreen password cracker via ADB (Tested only on Asus Zenfone 4 A450CG )☆10Jul 3, 2017Updated 8 years ago
- MasTKO is a security tool which detects DNS entries associated with AWS’s EC2 servers susceptible to takeover attack and attempts a takeo…☆11Jun 14, 2023Updated 2 years ago
- This script checks visa application status using idata.com.tr services in Turkey (for Germany and Italy) and notifies OSX Notification Ce…☆11Jul 9, 2015Updated 10 years ago
- Software project☆12Jun 21, 2022Updated 3 years ago
- Unpacks java-to-exe files converted by JWrapper☆12Dec 5, 2022Updated 3 years ago
- Colour Me Cards are your classic holiday cards, with a modern twist.☆15Dec 24, 2018Updated 7 years ago
- Papers of deep learning for trading☆12Jun 4, 2020Updated 5 years ago
- ☆10Dec 24, 2022Updated 3 years ago
- ☆13Oct 30, 2022Updated 3 years ago
- Gradio chat interface for FastMLX☆12Sep 22, 2024Updated last year
- ☆10Feb 9, 2015Updated 11 years ago
- ☆10May 17, 2024Updated last year
- "A Practical Recipe for Hardware Implants" presentation materials.☆13Nov 10, 2020Updated 5 years ago
- Miscellaneous IDA scripts and projects☆15Apr 14, 2021Updated 4 years ago
- Bytekit is a PHP extension that provides a userspace representation of the opcodes generated by the Zend engine compiler built into PHP.☆19May 21, 2011Updated 14 years ago
- Dumping ground for whatever IDA Pro scripts I write☆16Oct 9, 2016Updated 9 years ago
- Hardware Trojan on a Basis 3 FPGA for Hardware and Embedded Systems Security☆11May 1, 2017Updated 8 years ago
- IDA scripts that facilitate reverse engineering☆16Aug 10, 2016Updated 9 years ago
- Slack post-exploitation script for leaked bot tokens and "d" cookies☆16Nov 18, 2025Updated 3 months ago
- bctf2017 challenges☆11Apr 20, 2017Updated 8 years ago
- Exporters for OllyDbg and ImmunityDbg for use with zynamics BinNavi <= 3.0☆18Jan 10, 2012Updated 14 years ago
- Session material from my conference presentation at Live360\Techmentor in Orlando,November 2023☆11Nov 14, 2023Updated 2 years ago
- Exploit Pack - One step ahead☆12Sep 9, 2013Updated 12 years ago
- PSoC 4 BLE design example repository☆11May 3, 2017Updated 8 years ago