13o-bbr-bbq / Broken_FaceRecognitionLinks
The system is broken face recognition for adversarial example testing.
☆19Updated 4 years ago
Alternatives and similar repositories for Broken_FaceRecognition
Users that are interested in Broken_FaceRecognition are comparing it to the libraries listed below
Sorting:
- Leveraging CVE-2018-19788 without root shells☆19Updated 6 years ago
- Side Channel script☆25Updated 2 years ago
- A semi fast tool to bruteforce values of LDAP injections over HTTP.☆13Updated 11 years ago
- Interactive Post Exploitation Tool☆37Updated 5 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Updated 5 years ago
- A Simple PE File Heuristics Scanners☆51Updated 6 years ago
- My public exploit collection.☆31Updated 6 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆24Updated 7 years ago
- NmapPy - Python implementation of Nmap☆36Updated 6 years ago
- Random stuff☆16Updated 7 years ago
- This is a concept poc of command and control server implemented over blockchain☆52Updated 6 years ago
- The Python Password-Protected Obfuscator☆34Updated 6 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆28Updated 8 years ago
- Fresh malware samples caught in the wild daily from random places. 🎣☆19Updated 6 years ago
- PoC code for crashing windows active directory☆35Updated 6 years ago
- Cyberdelia, a Collection of Command and Control frameworks☆64Updated 5 years ago
- Powershell script which will take any payload and put it in the a bat script which delivers the payload. The payload is delivered using e…☆52Updated last year
- Example of malicious codes for educational purpose, don't make shit with that☆28Updated 6 years ago
- Community-based integrated malware identification system☆82Updated 2 years ago
- Includes 5 Known Application Whitelisting/ Application Control Bypass Techniques in One File.☆32Updated 9 years ago
- Simple Script "NativePayload_ARP2.sh" for Sending DATA via ARP Bcast Traffic to all systems in (LAN) by "Vid" tag☆14Updated 2 years ago
- A quick LKM rootkit that executes a reverse TCP netcat shell with root privileges.☆42Updated 7 years ago
- GUI Tool to generate threat intelligence information in various formats☆43Updated 7 years ago
- Tool to predict attacker groups from the techniques and software used☆49Updated 4 years ago
- Proof-of-Concept exploits for CVE-2017-11882☆42Updated 7 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- ArmourBird CSF - Container Security Framework☆44Updated 3 years ago
- ☆26Updated 5 years ago
- Small script for retrieving incoming transactions based on provided hour period.☆14Updated 3 years ago