Code for the WWW'20 paper "Nowhere to Hide: Cross-modal Identity Leakage between Biometrics and Devices"
☆23Dec 8, 2022Updated 3 years ago
Alternatives and similar repositories for CrossLeak
Users that are interested in CrossLeak are comparing it to the libraries listed below
Sorting:
- ATT&CK技战术数据☆15Feb 8, 2021Updated 5 years ago
- Some tools for EFI hackery☆41Feb 25, 2012Updated 14 years ago
- DigitalTwinSocCyberrange is a research project by the University of Regensburg and the Ionian University. This prototype aims to provide …☆11Apr 22, 2022Updated 3 years ago
- A feature packed multi-hack for the first-person shooter game Insurgency☆18Mar 15, 2017Updated 8 years ago
- Simple and old virtual machine☆17Apr 28, 2016Updated 9 years ago
- 3G/4G/5G authentication test troubleshooting tool☆61May 11, 2020Updated 5 years ago
- ☆28Apr 1, 2018Updated 7 years ago
- HackSys Extreme Vulnerable Driver - StackOverflow Exploit☆32Jan 9, 2017Updated 9 years ago
- Revised shell script for parsing .gnmap, .xml, or .nmap port scan results files to a CSV list, lists of IPs per port, web urls, and a sum…☆13Apr 17, 2020Updated 5 years ago
- Supplement to radare2-explorations.☆34Jan 4, 2017Updated 9 years ago
- Simple socket-based gateway to the Burp Collaborator☆34Nov 23, 2016Updated 9 years ago
- beacon,aggressor-scripts,cna,cobalt-strike,email☆36Jun 18, 2019Updated 6 years ago
- Software project☆12Jun 21, 2022Updated 3 years ago
- This script checks visa application status using idata.com.tr services in Turkey (for Germany and Italy) and notifies OSX Notification Ce…☆11Jul 9, 2015Updated 10 years ago
- ☆12Oct 1, 2024Updated last year
- Android lockscreen password cracker via ADB (Tested only on Asus Zenfone 4 A450CG )☆10Jul 3, 2017Updated 8 years ago
- MasTKO is a security tool which detects DNS entries associated with AWS’s EC2 servers susceptible to takeover attack and attempts a takeo…☆11Jun 14, 2023Updated 2 years ago
- DJI Assistant 2 web socket server exploitation tools☆37Mar 7, 2018Updated 8 years ago
- Common Proprietary Qualcomm Binaries☆10Dec 26, 2016Updated 9 years ago
- TG 2016 hacking compo repo☆10Mar 31, 2016Updated 9 years ago
- [UNOFFICIAL MIRROR] Automatic Win32 binary obfuscator☆47Apr 6, 2015Updated 10 years ago
- EVM in python from scratch because why not☆11Aug 22, 2022Updated 3 years ago
- DARPA Cyber Grand Challenge Linux source code☆17Jul 9, 2015Updated 10 years ago
- Hardware Trojan on a Basis 3 FPGA for Hardware and Embedded Systems Security☆11May 1, 2017Updated 8 years ago
- ☆10May 17, 2024Updated last year
- Intrusion Detection System (IDS) for Wireless Sensor Networks (WSN)☆19Apr 5, 2013Updated 12 years ago
- ☆13Oct 30, 2022Updated 3 years ago
- Session material from my conference presentation at Live360\Techmentor in Orlando,November 2023☆11Nov 14, 2023Updated 2 years ago
- open hardware security device☆10Jan 16, 2018Updated 8 years ago
- OS X rootkit loader version #2☆12Apr 9, 2015Updated 10 years ago
- Agent installed on node to launch IDA,Bindiff,... and send results to the server ( AutoDiffWeb )☆10Mar 25, 2016Updated 9 years ago
- The lecture notes and programs for my class on real analysis. This is very much work in progress!☆12Sep 19, 2021Updated 4 years ago
- Dumping ground for whatever IDA Pro scripts I write☆16Oct 9, 2016Updated 9 years ago
- slide☆13Oct 26, 2017Updated 8 years ago
- ☆10Feb 9, 2015Updated 11 years ago
- APK Static Analyzer☆10Dec 4, 2015Updated 10 years ago
- Hackme is a network security answer platform,Hackme网络安全答题平台☆10Nov 5, 2015Updated 10 years ago
- Colour Me Cards are your classic holiday cards, with a modern twist.☆15Dec 24, 2018Updated 7 years ago
- Wiegand data logger, replay device and micro door-controller☆14Jan 5, 2024Updated 2 years ago