39 results for “topic:replay-attack”
RF tool based on CC1101 module and Arduino Pro Micro 8VMHz/3.3V. Allows using CLI with human readable commands to control CC1101 board over USB interface. Putty or any other serial terminal can be used. It has similar functionality to YardStick One but is cheaper and doesn't need specialized software. Allows for RF jamming and simple replay attack
Cork/Face Presentation Attack Detection
Very simple 433MHz (EU/ASIA) 315 MHz (US) RF jammer for keyless cars theft prevention
A cybersecurity tool for RF scanning, copying, and replaying signals
Intercepting Bluetooth device communication and simulating packet responses of an iPhone from a Raspberry Pi 3
Example of using CC1101 module with Arduino Pro Micro ( ATMEGA32U4 ) for radio jamming
this is example of cloning my garage keys with Arduino Digispark and FS1000A transmitter. The keys sequences were recorded first using Universal Radio Hacker tool
Classic BWS: Liveness Detection, Deepfake Detection and PhotoVerify Face Match for KYC
In this project, we have implemented a network to detect real faces against fake ones.
Classic BWS: BWS Android sample code for app integration
Zalo AI Challenge 2022 Liveness Detection
Deep learning-based audio spoofing attack detection experiments for speaker verification.
Classic BWS: BWS HTML5 Unified User Interface
AdvSV stands as the first dataset developed specifically for evaluating Speaker Verification (SV) systems against adversarial attacks. It aims to benchmark the robustness of ASV models in the face of such attacks and offers vital resources for researchers to explore the characteristics of adversarial and replay attacks in this domain.
Classic BWS: BWS iOS sample code for app integration
BWS 3: Client App iOS for Face Liveness Detection (Passive & Active liveness detection & Challenge Response) and Photo ID Verification
A PHP Library for Cryptographically Secure Token Generation and Management
A device built with an Arduino board that captures wireless signals and replays them at specific frequencies. It supports operation at 433 MHz or 315 MHz frequencies for various signal applications.
A Python-based screen recording and playback tool inspired by Nvidia ShadowPlay, featuring real-time recording, UI components, and replay functionality.
BWS 3: BWS Client with Web App for Liveness Detection, Video Liveness Detection and Photo ID Verification
Baseline Experiments for ReMASC dataset.
The source code in the paper "When the Differences in Frequency Domain are Compensated: Understanding and Defeating Modulated Replay Attacks on Automatic Speech Recognition". This paper is published in the ACM Conference on Computer and Communications Security (CCS) 2020.
A nonce manager PHP library useful for preventing CSRF and replay attacks.
Zero-day in AppleMediaServices: Bag fetch failure disables Mescal/Absinthe signing. Requests to Apple services proceed unsigned, exposing downgrade, replay, and bypass risk. Includes analysis, log evidence, and PoC attack logic.
Post-quantum custody architecture. Separates key capability from spending authority. Every custody operation requires predicate evaluation before signing is permitted. Fail-closed by design.
Test of libSodium's ChaCha20-Poly1305 with increases security by deriving a different key per message
A project showcasing NFC vulnerabilities via replay attacks. Learn how intercepted NFC data is captured, stored, and replayed to exploit security gaps. Includes tools and guides. Created by an ethical hacker and cybersecurity student to raise awareness and improve NFC security.
Bitcoin anchored, ML-DSA signed time authority providing monotonic, replay safe EpochTicks for consent windows, policy enforcement, runtime validation, and alignment freshness.
Mobile Phone Detection with Modulated Replay Attack
CVE-2021-27289: Playback Protection Bypass on Ksix Zigbee devices