- All languages
- AGS Script
- ASP
- ActionScript
- Arduino
- Assembly
- Awk
- B4X
- Batchfile
- BitBake
- BlitzBasic
- C
- C#
- C++
- CMake
- CSS
- CoffeeScript
- Common Lisp
- Cuda
- Dart
- Dockerfile
- Eagle
- G-code
- Game Maker Language
- Gnuplot
- Go
- Groff
- HTML
- Haskell
- Java
- JavaScript
- Julia
- Jupyter Notebook
- KiCad Layout
- Kotlin
- Lua
- MATLAB
- MAXScript
- MDX
- Makefile
- Nginx
- Nix
- OCaml
- Objective-C
- OpenEdge ABL
- OpenSCAD
- PHP
- PLSQL
- Pascal
- Perl
- PostScript
- PowerShell
- Processing
- Prolog
- Propeller Spin
- Python
- QMake
- R
- Roff
- Ruby
- Rust
- SCSS
- SWIG
- Scala
- Scheme
- Shell
- Smarty
- Standard ML
- Svelte
- Swift
- SystemVerilog
- Tcl
- TeX
- TypeScript
- VBScript
- VHDL
- Verilog
- Visual Basic
- Vue
- kvlang
- nesC
Starred repositories
NVLeak: Off-Chip Side-Channel Attacks via Non-Volatile Memory Systems [USENIX Security '23]
Sound Recording and Accessing System based on Microphone Jamming and Active Noise Cancellation
Caller ID Spoofing Ultimate Edition
This is a research on high frequency emissions from an ATtiny microcontroller and possible counter measures. It is written in German, if you want a translation please email me. It was presented in …
This study explores the application of (DL) to enhance security in (NFC). Against particularly relay attacks, where attackers relay signals without need to break encryption or other protective meas…
We hacked people's webcams, studied if they noticed, and offer suggestions.
With the rapid expansion of the microphone market, the prevalence of microphone-based attacks has risen significantly. This project addresses this issue by developing an ultrasonic jammer designed …
Presentation about RFID, explaining its security and privacy risks. Work done for the Computer and Network Security course at university of Padua, academic year 2016/2017.
Hardware hacking tutorial -- intended for KUICS study.