The system is broken face recognition for adversarial example testing.
☆20Aug 18, 2021Updated 4 years ago
Alternatives and similar repositories for Broken_FaceRecognition
Users that are interested in Broken_FaceRecognition are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This is the linux version of the R.A.T client written in c#☆10Jun 25, 2017Updated 8 years ago
- BlazeFox Exploit☆18Oct 13, 2018Updated 7 years ago
- Download all malicious files from a Kippo SSH honeypot database☆23Mar 24, 2014Updated 12 years ago
- GyoiThon is a growing penetration test tool using Machine Learning.☆18Apr 28, 2020Updated 6 years ago
- ☆32Oct 20, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- DDoS Script | Scanner☆27Jan 8, 2015Updated 11 years ago
- An Atom, RSS, and JSON feed reading Telegram bot 🤖☆26May 19, 2024Updated last year
- ⚔️MITRE ATT&CK Machinations in R☆23Aug 11, 2020Updated 5 years ago
- A high-performance hardware accelerator for compression/decompression algorithm library of zlib based on kunpeng processor☆17May 19, 2021Updated 4 years ago
- .NET tool for enumeration processes and dumping memory.☆56Apr 4, 2019Updated 7 years ago
- ☆10Nov 29, 2019Updated 6 years ago
- Darknet Osint Graph Explorer☆127Oct 7, 2020Updated 5 years ago
- The source of the @StrangerBot Telegram Bot.☆39Sep 24, 2015Updated 10 years ago
- The Web Controller☆10Dec 4, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Bug Bounty Monitor☆15Nov 23, 2020Updated 5 years ago
- Safe evaluation of untrusted code on containers☆12Sep 6, 2019Updated 6 years ago
- Cymric - Portable secure random number generator☆21Mar 10, 2014Updated 12 years ago
- Fully functional & encrypted chat-application.☆11Mar 28, 2024Updated 2 years ago
- ☆11Aug 11, 2016Updated 9 years ago
- RKQC is a compiler for reversible logic circuitry. The framework has been developed to compile high level circuit descriptions down to "Q…☆17Jul 22, 2016Updated 9 years ago
- security course list☆14Sep 18, 2015Updated 10 years ago
- 寻找可注入进程☆13Jul 16, 2020Updated 5 years ago
- ☆10Aug 18, 2021Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- All open source libraries and projects from the Caldera team.☆10Dec 9, 2022Updated 3 years ago
- Experimental python3.x based ICMP bind shell listener using scapy and windows 'compatible'☆10May 29, 2020Updated 5 years ago
- Use current thread token to execute command☆15Jan 27, 2021Updated 5 years ago
- A node wrapper for jsonbox.io☆11Feb 2, 2022Updated 4 years ago
- .NET Tool for parsing and utilizing x86 semantics defined in K. It currently features a WIP symbolic expression generator for VTIL.☆16Feb 4, 2021Updated 5 years ago
- A better way to write shell code☆11May 28, 2021Updated 4 years ago
- Presentations from the CX Security Labs team☆35Jul 24, 2025Updated 9 months ago
- check cmd execute☆14Feb 4, 2017Updated 9 years ago
- CERT Australia Cyber Threat Intelligence (CTI) Toolkit☆15Nov 11, 2017Updated 8 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- The Network project is a C++ encapsulation of WinSock2 to form a lightweight network library; The Graphics project is a C++ encapsulation…☆13Oct 31, 2017Updated 8 years ago
- A human readable log format for Python☆13Nov 3, 2017Updated 8 years ago
- A Modern Approach☆10Sep 5, 2015Updated 10 years ago
- Collection of exploits that were verified by an automated system☆13Jun 17, 2021Updated 4 years ago
- Automatically add links to your WordPress content.☆25Aug 29, 2017Updated 8 years ago
- Scripts and payloads for internet-wide network scanning☆17Aug 2, 2015Updated 10 years ago
- Some Of Huawei Routers Exploits☆15Sep 1, 2016Updated 9 years ago