13o-bbr-bbq / Broken_FaceRecognitionLinks
The system is broken face recognition for adversarial example testing.
☆20Updated 4 years ago
Alternatives and similar repositories for Broken_FaceRecognition
Users that are interested in Broken_FaceRecognition are comparing it to the libraries listed below
Sorting:
- A Simple PE File Heuristics Scanners☆52Updated 6 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆49Updated 8 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Updated 5 years ago
- Botnet Simulation Framework☆77Updated 5 years ago
- Leveraging CVE-2018-19788 without root shells☆19Updated 7 years ago
- Python wrapper for the Mitre ATT&CK framework API☆30Updated 7 years ago
- A semi fast tool to bruteforce values of LDAP injections over HTTP.☆13Updated 12 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Updated 7 years ago
- Cyberdelia, a Collection of Command and Control frameworks☆64Updated 6 years ago
- The Python Password-Protected Obfuscator☆33Updated 6 years ago
- Incident Response Collections☆11Updated 7 years ago
- Example of malicious codes for educational purpose, don't make shit with that☆29Updated 6 years ago
- Reverse engineered APT38 DYEPACK samples used to empty SWIFT banking servers. Use caution when handling live binaries.☆23Updated 6 years ago
- Exploit for Mass Remote Code Execution on GPON home routers (CVE-2018-10562) obtained from Shodan.☆24Updated 7 years ago
- Automatically parses and attacks BloodHound-generated graphs☆42Updated 7 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 3 years ago
- PoC code for crashing windows active directory☆35Updated 7 years ago
- NmapPy - Python implementation of Nmap☆35Updated 7 years ago
- BlackHat Europe 2017 Slides☆25Updated 7 years ago
- ☆26Updated 5 years ago
- Commands to perform various activities related to penetration testing and red teaming☆20Updated 5 years ago
- Interactive Post Exploitation Tool☆37Updated 6 years ago
- Perform MiTM attack and remove encryption on Windows Remote Registry Protocol.☆35Updated 8 years ago
- Random stuff☆16Updated 7 years ago
- My public exploit collection.☆31Updated 7 years ago
- ☆16Updated 10 years ago
- Small script for retrieving incoming transactions based on provided hour period.☆14Updated 3 years ago
- Proof-of-Concept exploits for CVE-2017-11882☆41Updated 8 years ago
- Automated script to search in SMB protocol for availables pipe names☆24Updated 7 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Updated 11 years ago