CyberSecurityUP / DeepNude-DetectorLinks
This project is a tool for detecting nudity in images, allowing users to analyze both local images and images from URLs. It utilizes the NudeNet library to classify and detect explicit content. Additionally, it offers an option to automatically censor images identified as inappropriate.
β15Updated 11 months ago
Alternatives and similar repositories for DeepNude-Detector
Users that are interested in DeepNude-Detector are comparing it to the libraries listed below
Sorting:
- Ransomware for demonstrationβ18Updated 2 years ago
- reveal origins behind reverse proxies & hidden services π π§ π»β37Updated last month
- Modular framework to exploit UPS devicesβ65Updated 2 years ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious dβ¦β40Updated 2 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentialsβ54Updated 2 years ago
- Capture screenshots of onion services on an onion service.β72Updated last year
- A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about Social Enginβ¦β19Updated 3 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writteβ¦β28Updated 3 years ago
- Multithread reverse shell listenerβ26Updated last year
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.β19Updated 2 years ago
- CloudDefense.ai is an automated web application security testing tool that audits your web applications by checking for vulnerabilities lβ¦β49Updated 8 months ago
- The Kill-The-Code Python Program provides a robust mechanism for remotely controlling code execution by monitoring a specified URL for a β¦β17Updated last year
- ARP Spoofing Defender is a project designed to protect local networks from ARP Spoofing attacks. ARP Spoofing Defender provides mechanismβ¦β20Updated 10 months ago
- Configure FireFox with Security and Intelligance features for OSINT and Security Investigations.β16Updated last year
- β33Updated last year
- Ransomware groups postsβ42Updated this week
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmailβ¦β23Updated last year
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.β34Updated 2 weeks ago
- Phishable is a project that logs misconfigured DNS that can be exploited to conduct phishing attacks & spoof domains. Phishable helps orgβ¦β22Updated 2 years ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.β42Updated last year
- Highly configurable script for dictionary/spray attacks against online web applications.β53Updated 2 years ago
- It was developed to speed up the processes of SOC Analysts during analysisβ47Updated last year
- Sabonis, a Digital Forensics and Incident Response pivoting toolβ17Updated 3 years ago
- Automate Blind SQL Injection with Python.β22Updated 3 years ago
- Enumeration & fingerprint toolβ24Updated last year
- List of sources for cybersecurity newsβ39Updated 2 years ago
- masscan with exclusive excludesβ58Updated last year
- WIP Post-exploitation framework tailored for hypervisors.β50Updated last year
- Simple and efficient file shreddingβ14Updated 6 years ago
- This is a working variant of the Mirai IOT botnetβ14Updated 2 years ago