CyberSecurityUP / DeepNude-DetectorLinks
This project is a tool for detecting nudity in images, allowing users to analyze both local images and images from URLs. It utilizes the NudeNet library to classify and detect explicit content. Additionally, it offers an option to automatically censor images identified as inappropriate.
☆18Updated last year
Alternatives and similar repositories for DeepNude-Detector
Users that are interested in DeepNude-Detector are comparing it to the libraries listed below
Sorting:
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆18Updated 3 years ago
- Red Teaming Tactics and Techniques☆13Updated 3 years ago
- The Kill-The-Code Python Program provides a robust mechanism for remotely controlling code execution by monitoring a specified URL for a …☆18Updated last year
- Ransomware groups posts☆44Updated this week
- Modular framework to exploit UPS devices☆65Updated 2 years ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆41Updated 2 years ago
- Ransomware for demonstration☆19Updated 2 years ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆24Updated last year
- Configure FireFox with Security and Intelligance features for OSINT and Security Investigations.☆17Updated last year
- Fuxsociety Mr Robot 2.1☆28Updated 2 years ago
- Curated list of ransomware-related resources; awesome style.☆29Updated last year
- Capture screenshots of onion services on an onion service.☆73Updated last year
- Multithread reverse shell listener☆26Updated 2 years ago
- Methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory.☆10Updated 3 years ago
- Enumeration & fingerprint tool☆24Updated last year
- Python3 script to dump breach data from Dehashed☆42Updated 7 months ago
- Python-based web scraper for a darkweb marketplace on the Tor network.☆38Updated last year
- Phishing Reverse Proxy with MFA bypass☆17Updated 3 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆55Updated 2 years ago
- A tool designed to analyse email headers☆40Updated 3 years ago
- Tor onion address lookup☆59Updated last month
- Proof of concept denial of service over TOR stress test tool☆42Updated 7 years ago
- It was developed to speed up the processes of SOC Analysts during analysis☆47Updated last year
- ARP Spoofing Defender is a project designed to protect local networks from ARP Spoofing attacks. ARP Spoofing Defender provides mechanism…☆23Updated 2 months ago
- A database for storing, querying and doing stats on credential leaks☆39Updated 2 years ago
- Discord bot for the Shodan API - OSINT tool☆83Updated last year
- Master of Science in Cybersecurity, Sapienza University of Rome.☆58Updated last year
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆49Updated last year
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago
- List of sources for cybersecurity news☆41Updated 3 years ago