The system is broken face recognition for adversarial example testing.
☆20Aug 18, 2021Updated 4 years ago
Alternatives and similar repositories for Broken_FaceRecognition
Users that are interested in Broken_FaceRecognition are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This is the linux version of the R.A.T client written in c#☆10Jun 25, 2017Updated 8 years ago
- BlazeFox Exploit☆18Oct 13, 2018Updated 7 years ago
- Minecraft: Bedrock Edition servers, but faster.☆13Dec 31, 2018Updated 7 years ago
- Download all malicious files from a Kippo SSH honeypot database☆23Mar 24, 2014Updated 12 years ago
- ☆32Oct 20, 2018Updated 7 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- DDoS Script | Scanner☆27Jan 8, 2015Updated 11 years ago
- An Atom, RSS, and JSON feed reading Telegram bot 🤖☆25May 19, 2024Updated last year
- ⚔️MITRE ATT&CK Machinations in R☆23Aug 11, 2020Updated 5 years ago
- A high-performance hardware accelerator for compression/decompression algorithm library of zlib based on kunpeng processor☆17May 19, 2021Updated 4 years ago
- Darknet Osint Graph Explorer☆127Oct 7, 2020Updated 5 years ago
- The Web Controller☆10Dec 4, 2019Updated 6 years ago
- Safe evaluation of untrusted code on containers☆12Sep 6, 2019Updated 6 years ago
- Firefox, Chrome, Safari browser extensions, Rails control server, meterpreter scripts, SET plugin☆54Jul 21, 2022Updated 3 years ago
- Public Exploits + Extra-curriculum for OSCE Exam Preparation☆79Sep 9, 2020Updated 5 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆30Jul 29, 2014Updated 11 years ago
- 寻找可注入进程☆13Jul 16, 2020Updated 5 years ago
- ☆10Aug 18, 2021Updated 4 years ago
- A fuzz demo for windows driver based on IoControlCode☆12May 25, 2018Updated 7 years ago
- Experimental python3.x based ICMP bind shell listener using scapy and windows 'compatible'☆10May 29, 2020Updated 5 years ago
- Use current thread token to execute command☆15Jan 27, 2021Updated 5 years ago
- Code and articles associated with my Wikileaks research project, but could applicable to reading up on any item in the news and visualizi…☆21Apr 4, 2015Updated 11 years ago
- .NET Tool for parsing and utilizing x86 semantics defined in K. It currently features a WIP symbolic expression generator for VTIL.☆16Feb 4, 2021Updated 5 years ago
- A better way to write shell code☆11May 28, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Presentations from the CX Security Labs team☆35Jul 24, 2025Updated 8 months ago
- check cmd execute☆14Feb 4, 2017Updated 9 years ago
- CERT Australia Cyber Threat Intelligence (CTI) Toolkit☆15Nov 11, 2017Updated 8 years ago
- The Network project is a C++ encapsulation of WinSock2 to form a lightweight network library; The Graphics project is a C++ encapsulation…☆13Oct 31, 2017Updated 8 years ago
- ☣️ Necro Stealer + Web Panel☆10May 2, 2020Updated 5 years ago
- Exploiting Android devices☆10Sep 12, 2022Updated 3 years ago
- A human readable log format for Python☆13Nov 3, 2017Updated 8 years ago
- A Modern Approach☆10Sep 5, 2015Updated 10 years ago
- Collection of exploits that were verified by an automated system☆13Jun 17, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- 聚合交易平台BitLeague☆11Sep 30, 2018Updated 7 years ago
- Automatically add links to your WordPress content.☆25Aug 29, 2017Updated 8 years ago
- Some Of Huawei Routers Exploits☆15Sep 1, 2016Updated 9 years ago
- A template to make injected DLLs for modding☆11Dec 17, 2020Updated 5 years ago
- The Recon scanning tool scans websites for open files & directories specified in the custom config file. Default server configuration fil…☆15Apr 4, 2018Updated 8 years ago
- A collection of Vulnerable Windows Drivers☆16Dec 4, 2021Updated 4 years ago
- HWP Document Fuzzer (Simple OLE Structure Parsing)☆15Dec 30, 2014Updated 11 years ago