13o-bbr-bbq / Broken_FaceRecognitionLinks
The system is broken face recognition for adversarial example testing.
☆20Updated 4 years ago
Alternatives and similar repositories for Broken_FaceRecognition
Users that are interested in Broken_FaceRecognition are comparing it to the libraries listed below
Sorting:
- Leveraging CVE-2018-19788 without root shells☆19Updated 6 years ago
- NmapPy - Python implementation of Nmap☆36Updated 6 years ago
- Example of malicious codes for educational purpose, don't make shit with that☆28Updated 6 years ago
- Botnet Simulation Framework☆77Updated 5 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆48Updated 8 years ago
- A semi fast tool to bruteforce values of LDAP injections over HTTP.☆13Updated 11 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆24Updated 7 years ago
- Fresh malware samples caught in the wild daily from random places. 🎣☆19Updated 6 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 7 years ago
- The Python Password-Protected Obfuscator☆33Updated 6 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Updated 5 years ago
- Commands to perform various activities related to penetration testing and red teaming☆18Updated 5 years ago
- A Python based backdoor that uses Steganography and a Cloud Image Service as a command and control server.☆26Updated 9 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Updated 7 years ago
- Random stuff☆16Updated 7 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- My public exploit collection.☆31Updated 6 years ago
- pentest toolbox☆28Updated 3 years ago
- Asynchronous MSF RPC API wrapper☆20Updated 2 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 3 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆28Updated 8 years ago
- A Simple PE File Heuristics Scanners☆52Updated 6 years ago
- SAIVS (Spider Artificial Intelligence Vulnerability Scanner).☆54Updated 4 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- Unofficial WhatCMS API package☆41Updated 4 years ago
- Side Channel script☆25Updated 2 years ago
- intrusion detection☆24Updated 8 years ago
- PHP Phishing Framework☆28Updated 11 years ago
- Automated Cyber Offense☆91Updated 6 years ago
- ☆16Updated 10 years ago