Code for the WWW'20 paper "Nowhere to Hide: Cross-modal Identity Leakage between Biometrics and Devices"
☆23Dec 8, 2022Updated 3 years ago
Alternatives and similar repositories for CrossLeak
Users that are interested in CrossLeak are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Configure SPI flash write protection.☆24May 11, 2020Updated 5 years ago
- ATT&CK技战术数据☆15Feb 8, 2021Updated 5 years ago
- Windows Privilege Escalation☆10Dec 27, 2014Updated 11 years ago
- A feature packed multi-hack for the first-person shooter game Insurgency☆18Mar 15, 2017Updated 9 years ago
- DigitalTwinSocCyberrange is a research project by the University of Regensburg and the Ionian University. This prototype aims to provide …☆11Apr 22, 2022Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Bypass UAC by abusing the Windows Defender Firewall Control Panel, environment variables, and shell protocol handlers☆17Jul 12, 2021Updated 4 years ago
- ☆32Oct 20, 2018Updated 7 years ago
- Some tools for EFI hackery☆41Feb 25, 2012Updated 14 years ago
- Websocket client API for AutoHotKey and other scripting and programming languages.☆13Jun 17, 2016Updated 9 years ago
- JavaScript/Flash bridge to the Twitter Streaming API -- LEGACY☆33May 11, 2010Updated 15 years ago
- 3G/4G/5G authentication test troubleshooting tool☆62May 11, 2020Updated 5 years ago
- Papers of deep learning for trading☆12Jun 4, 2020Updated 5 years ago
- Supplement to radare2-explorations.☆35Jan 4, 2017Updated 9 years ago
- An IRC client and bot framework written in AutoHotkey☆22Jul 9, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Check if your computer is patched against EternalBlue☆16May 19, 2017Updated 8 years ago
- Simple and old virtual machine☆17Apr 28, 2016Updated 10 years ago
- ☆93Apr 17, 2021Updated 5 years ago
- ☆28Apr 1, 2018Updated 8 years ago
- Industrial Control Systems Protocol Decoders☆22Apr 30, 2014Updated 12 years ago
- The diary of a n00b in the unfamiliar and terrifying venture into Capture-the-flag.☆12Oct 14, 2018Updated 7 years ago
- ☆51Sep 7, 2017Updated 8 years ago
- HackSys Extreme Vulnerable Driver - StackOverflow Exploit☆32Jan 9, 2017Updated 9 years ago
- config files...☆12Aug 30, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- 500 Lines or Less 繁體中文翻譯☆11Mar 12, 2019Updated 7 years ago
- [UNOFFICIAL MIRROR] Automatic Win32 binary obfuscator☆47Apr 6, 2015Updated 11 years ago
- pwn☆12Apr 7, 2019Updated 7 years ago
- Bypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler☆30Jul 12, 2021Updated 4 years ago
- 国赛分站赛命题模板☆40May 23, 2018Updated 7 years ago
- A part of speech tagger written in PHP.☆14Sep 16, 2021Updated 4 years ago
- Browser extension to use shiori bookmark service☆18Apr 26, 2018Updated 8 years ago
- POC of code that downloads and executes shellcode in memory.☆80May 25, 2014Updated 11 years ago
- Ultimate phishing tool. Socialize with the credentials.终极网络钓鱼工具。与凭证进行社交。https://github.com/UndeadSec☆28Aug 15, 2018Updated 7 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- beacon,aggressor-scripts,cna,cobalt-strike,email☆36Jun 18, 2019Updated 6 years ago
- PoC dlls for Task Scheduler COM Hijacking☆92Jul 20, 2016Updated 9 years ago
- ☆10Apr 8, 2018Updated 8 years ago
- Inti easter challenge poc☆17May 4, 2021Updated 4 years ago
- Small POC in powershell exploiting hardlinks during the VM deletion process☆55Jan 18, 2020Updated 6 years ago
- ☆12Dec 26, 2017Updated 8 years ago
- "A Practical Recipe for Hardware Implants" presentation materials.☆13Nov 10, 2020Updated 5 years ago