The system is broken face recognition for adversarial example testing.
☆20Aug 18, 2021Updated 4 years ago
Alternatives and similar repositories for Broken_FaceRecognition
Users that are interested in Broken_FaceRecognition are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This is the linux version of the R.A.T client written in c#☆10Jun 25, 2017Updated 8 years ago
- Minecraft: Bedrock Edition servers, but faster.☆13Dec 31, 2018Updated 7 years ago
- This project deals with vulnerability analysis and classification using machine learning techniques i.e. Natural Language Processing.☆10Feb 21, 2019Updated 7 years ago
- ☆32Oct 20, 2018Updated 7 years ago
- DDoS Script | Scanner☆27Jan 8, 2015Updated 11 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- An Atom, RSS, and JSON feed reading Telegram bot 🤖☆25May 19, 2024Updated last year
- A high-performance hardware accelerator for compression/decompression algorithm library of zlib based on kunpeng processor☆17May 19, 2021Updated 4 years ago
- .NET tool for enumeration processes and dumping memory.☆57Apr 4, 2019Updated 6 years ago
- ☆10Nov 29, 2019Updated 6 years ago
- The source of the @StrangerBot Telegram Bot.☆39Sep 24, 2015Updated 10 years ago
- Bug Bounty Monitor☆15Nov 23, 2020Updated 5 years ago
- Cymric - Portable secure random number generator☆21Mar 10, 2014Updated 12 years ago
- Firefox, Chrome, Safari browser extensions, Rails control server, meterpreter scripts, SET plugin☆54Jul 21, 2022Updated 3 years ago
- Public Exploits + Extra-curriculum for OSCE Exam Preparation☆79Sep 9, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆29Jul 29, 2014Updated 11 years ago
- ☆11Mar 19, 2019Updated 7 years ago
- Fully functional & encrypted chat-application.☆11Mar 28, 2024Updated 2 years ago
- ☆11Aug 11, 2016Updated 9 years ago
- Incident Response Collections☆11Jul 24, 2018Updated 7 years ago
- security course list☆14Sep 18, 2015Updated 10 years ago
- 寻找可注入进程☆13Jul 16, 2020Updated 5 years ago
- ☆10Aug 18, 2021Updated 4 years ago
- A fuzz demo for windows driver based on IoControlCode☆12May 25, 2018Updated 7 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Some Of Huawei Routers Exploits☆13Sep 1, 2016Updated 9 years ago
- Experimental python3.x based ICMP bind shell listener using scapy and windows 'compatible'☆10May 29, 2020Updated 5 years ago
- Use current thread token to execute command☆15Jan 27, 2021Updated 5 years ago
- Code and articles associated with my Wikileaks research project, but could applicable to reading up on any item in the news and visualizi…☆21Apr 4, 2015Updated 10 years ago
- .NET Tool for parsing and utilizing x86 semantics defined in K. It currently features a WIP symbolic expression generator for VTIL.☆16Feb 4, 2021Updated 5 years ago
- Presentations from the CX Security Labs team☆35Jul 24, 2025Updated 8 months ago
- check cmd execute☆14Feb 4, 2017Updated 9 years ago
- CERT Australia Cyber Threat Intelligence (CTI) Toolkit☆15Nov 11, 2017Updated 8 years ago
- The Network project is a C++ encapsulation of WinSock2 to form a lightweight network library; The Graphics project is a C++ encapsulation…☆13Oct 31, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A human readable log format for Python☆13Nov 3, 2017Updated 8 years ago
- A Modern Approach☆10Sep 5, 2015Updated 10 years ago
- 聚合交易平台BitLeague☆11Sep 30, 2018Updated 7 years ago
- Automatically add links to your WordPress content.☆25Aug 29, 2017Updated 8 years ago
- A collection of Vulnerable Windows Drivers☆16Dec 4, 2021Updated 4 years ago
- A template to make injected DLLs for modding☆11Dec 17, 2020Updated 5 years ago
- The Recon scanning tool scans websites for open files & directories specified in the custom config file. Default server configuration fil…☆15Apr 4, 2018Updated 7 years ago