13o-bbr-bbq / Broken_FaceRecognitionLinks
The system is broken face recognition for adversarial example testing.
☆20Updated 4 years ago
Alternatives and similar repositories for Broken_FaceRecognition
Users that are interested in Broken_FaceRecognition are comparing it to the libraries listed below
Sorting:
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Updated 7 years ago
- Quantum Insert Backdoor POC☆11Updated 8 years ago
- Interactive Post Exploitation Tool☆37Updated 6 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Updated 5 years ago
- A semi fast tool to bruteforce values of LDAP injections over HTTP.☆13Updated 12 years ago
- Leveraging CVE-2018-19788 without root shells☆19Updated 7 years ago
- The Python Password-Protected Obfuscator☆33Updated 6 years ago
- ☆16Updated 10 years ago
- Side Channel script☆25Updated 2 years ago
- Asynchronous MSF RPC API wrapper☆20Updated 3 years ago
- Security tools, scanners, exploit code☆31Updated 8 years ago
- A Python based backdoor that uses Steganography and a Cloud Image Service as a command and control server.☆26Updated 9 years ago
- UNMAINTAINED - Vulnerability scanner and information gatherer for the Concrete5 CMS☆20Updated 5 years ago
- Finally, reverse/bind shells written in python, encrypted with ssl!☆39Updated 6 years ago
- PoC code for crashing windows active directory☆35Updated 7 years ago
- Automate SSH communication with firewalls, switches, etc.☆27Updated 7 years ago
- Python wrapper for the Mitre ATT&CK framework API☆30Updated 7 years ago
- This is a concept poc of command and control server implemented over blockchain☆56Updated 6 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆37Updated 4 years ago
- Incident Response Collections☆11Updated 7 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- ☆26Updated 5 years ago
- TP-Link Archer C50 V3 devices before Build 200318 Rel. 62209 allows remote attackers to cause a denial of service via a crafted HTTP Head…☆20Updated 5 years ago
- Botnet Simulation Framework☆78Updated 5 years ago
- ☆11Updated 8 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆49Updated 8 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- Automatically parses and attacks BloodHound-generated graphs☆42Updated 7 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆19Updated 6 years ago
- Tool to predict attacker groups from the techniques and software used☆49Updated 4 years ago