Security system to prevent Shoulder Surfing Attacks

Overview

Surf_Sec

Security system to prevent Shoulder Surfing Attacks.

REQUIREMENTS:

  • Python 3.6+
  • XAMPP INSTALLED
  • METHOD TO CONFIGURE PROJECT:

    1. Clone the repo to a root folder. (eg. SSP)
    2. Extract the repo to root directory.
    3. Go to directory SurfSecurity-master , just created.
    4. Move all the folders and file to root folder(SSP)
    5. Delete SurfSecurity-master (as ir is empty)
    6. Open Command Prompt
    7. CD TO root folder(SSP) 8 Enter the following commands --> A. pip install virtualenv B. virtualenv ssp_env C. ssp_env\Scripts\activate --> Virtual environment is created and run. D. pip install requirements.txt (do not close command prompt)

    CREATING THE DATABASE REQUIRED:

    1. Open the XAMPP controller.
    2. Start the Apache and MySQL server. (KEEP THEM OPEN)
    3. Open Browser and go to localhost/phpmyadmin
    4. Create a databae named "ssp". Create no table in it.
    5. Go to root folder(SSP). Go to Register Folder. Fo to LogicFiles Folder. Open "connectToDatabase.py" in a text editor (preferable IDLE).
    6. Uncomment the commentd part (the SQL query and cursor.execute). Run the file.
    7. Once file is run, again comment the both part (the SQL query and cursor.execute). Save the file and close it.

    RUN THE PROJECT

    1. Open the command project. (Virtual environment should be running and the curent folder open should be root folder(ssp))
    2. Run the following commands --> A. python manage.py makemigrations B. python manage.py migrate C. python manage.py runserver
    3. Open browser and enter the url --> localhost:8000/login
    Owner
    Aman Anand
    I am a multi-faceted engineering student currently studying at VIT, Vellore with a keen interest in ML, Blockchain, Web, and Open Source development!
    Aman Anand
    proxyshell payload generate

    Py Permutative Encoding https://docs.microsoft.com/en-us/openspecs/office_file_formats/ms-pst/5faf4800-645d-49d1-9457-2ac40eb467bd Generate proxyshell

    Evi1cg 63 Nov 15, 2022
    Flutter Reverse Engineering Framework

    This framework helps reverse engineer Flutter apps using patched version of Flutter library which is already compiled and ready for app repacking. There are changes made to snapshot deserialization p

    PT SWARM 910 Jan 01, 2023
    Malware Configuration And Payload Extraction

    CAPE: Malware Configuration And Payload Extraction CAPE is a malware sandbox. It is derived from Cuckoo and is designed to automate the process of mal

    Kevin O'Reilly 1k Dec 30, 2022
    Simple Dos-Attacker.

    dos-attacker ❕ Atenção Não ataque sites privados. isto é illegal. 🖥️ Pré-requisitos Ultima versão do Python3. para verificar isto, é bem simples. Bas

    Dio brando 10 Apr 15, 2022
    Open Source Intelligence gathering tool aimed at reducing the time spent harvesting information from open sources.

    The Recon-ng Framework Recon-ng content now available on Pluralsight! Recon-ng is a full-featured reconnaissance framework designed with the goal of p

    2.4k Jan 07, 2023
    MD5-CRACKER - A gmail brute force app created with python3

    MD5-CRACKER So this is my first app i created with python3 . if you guys downloa

    2 Nov 10, 2022
    "Video Moment Retrieval from Text Queries via Single Frame Annotation" in SIGIR 2022.

    ViGA: Video moment retrieval via Glance Annotation This is the official repository of the paper "Video Moment Retrieval from Text Queries via Single F

    Ran Cui 38 Dec 31, 2022
    MSDorkDump is a Google Dork File Finder that queries a specified domain name and variety of file extensions

    MSDorkDump is a Google Dork File Finder that queries a specified domain name and variety of file extensions (pdf, doc, docx, etc), and downloads them.

    Joe Helle 150 Jan 03, 2023
    Unauthenticated Sqlinjection that leads to dump data base but this one impersonated Admin and drops a interactive shell

    Unauthenticated Sqlinjection that leads to dump database but this one impersonated Admin and drops a interactive shell

    sam 16 Nov 09, 2022
    Coerce authentication from Windows hosts via MS-FSRVP (Requires FS-VSS-AGENT service running on host)

    VSSTrigger Coerce authentication from Windows hosts via MS-FSRVP (Requires FS-VS

    Filip Dragovic 6 Jul 24, 2022
    A compact version of EDI-Vetter, which uses the TLS output to quickly vet transit signals.

    A compact version of EDI-Vetter, which uses the TLS output to quickly vet transit signals. All your favorite hits in a simplified format.

    Jon Zink 2 Aug 03, 2022
    IDA scripts for hypervisor (Hyper-v) analysis and reverse engineering automation

    Re-Scripts IA32-VMX-Helper (IDA-Script) IA32-MSR-Decoder (IDA-Script) IA32 VMX Helper It's an IDA script (Updated IA32 MSR Decoder) which helps you to

    Behrooz Abbassi 16 Oct 08, 2022
    NIVOS is a hacking tool that allows you to scan deeply , crack wifi, see people on your network

    NIVOS is a hacking tool that allows you to scan deeply , crack wifi, see people on your network. It applies to all linux operating systems. And it is improving every day, new packages are added. Than

    Error 263 Jan 01, 2023
    Burp Extensions

    Burp Extensions This is a collection of extensions to Burp Suite that I have written. getAllParams.py - Version 1.2 This is a python extension that ru

    /XNL-h4ck3r 364 Dec 30, 2022
    Chapter 1 of the AWS Cookbook

    Chapter 1 - Security Set and export your default region: export AWS_REGION=us-east-1 Set your AWS ACCOUNT ID:: AWS_ACCOUNT_ID=$(aws sts get-caller-ide

    AWS Cookbook 30 Nov 27, 2022
    Directory Traversal in Afterlogic webmail aurora and pro

    CVE-2021-26294 Exploit Directory Traversal in Afterlogic webmail aurora and pro . Description: AfterLogic Aurora and WebMail Pro products with 7.7.9 a

    Ashish Kunwar 8 Nov 09, 2022
    A semi-automatic osint/recon framework.

    Smog Framework A semi-automatic osint/recon framework. Requirements git Python = 3.8 How to use it

    toast 22 Oct 17, 2022
    Generate your own NFTs and their metadata based on your desired probabilities.

    Generate your own NFTs and their metadata based on your desired probabilities. Use your own art assets too! Perfect for use with Candy Machine.

    hex 7 Sep 16, 2022
    A small Minecraft server to help players detect vulnerability to the Log4Shell exploit 🐚

    log4check A small Minecraft server to help players detect vulnerability to the Log4Shell exploit 🐚 Tested to work between Minecraft versions 1.12.2 a

    Evan J. Markowitz 4 Dec 23, 2021
    Privilege escalation with polkit - CVE-2021-3560

    Polkit-exploit - CVE-2021-3560 Privilege escalation with polkit - CVE-2021-3560 Summary CVE-2021-3560 is an authentication bypass on polkit, which all

    Ahmad Almorabea 95 Dec 27, 2022