CyberSecurityUP / DeepNude-DetectorLinks
This project is a tool for detecting nudity in images, allowing users to analyze both local images and images from URLs. It utilizes the NudeNet library to classify and detect explicit content. Additionally, it offers an option to automatically censor images identified as inappropriate.
☆12Updated 9 months ago
Alternatives and similar repositories for DeepNude-Detector
Users that are interested in DeepNude-Detector are comparing it to the libraries listed below
Sorting:
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆34Updated 2 weeks ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated last year
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- Enumeration & fingerprint tool☆25Updated last year
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆29Updated 3 years ago
- The Kill-The-Code Python Program provides a robust mechanism for remotely controlling code execution by monitoring a specified URL for a …☆16Updated 10 months ago
- An automated e-mail OSINT tool☆21Updated 3 years ago
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆13Updated last year
- Automate Blind SQL Injection with Python.☆23Updated 2 years ago
- Simple Tool for webhacking☆11Updated 2 years ago
- ☆14Updated 3 months ago
- Malware Libraries focused in help Malware Development☆23Updated 2 years ago
- Ransomware for demonstration☆17Updated 2 years ago
- If you a security engineer or an aspirant Security professional then Setting up a Wazuh home lab environment is an excellent way for SOC …☆12Updated last year
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- Capture screenshots of onion services on an onion service.☆49Updated last year
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13Updated last year
- A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticat…☆8Updated last year
- Red Teaming Tactics and Techniques☆14Updated 3 years ago
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆21Updated 2 years ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆39Updated last year
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7Updated 3 years ago
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆17Updated 11 months ago
- Proof of concept denial of service over TOR stress test tool☆41Updated 6 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆35Updated 2 years ago
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆19Updated 2 years ago
- Python3 script to dump breach data from Dehashed☆32Updated last month
- PowerSploit - A PowerShell Post-Exploitation Framework☆23Updated 3 years ago
- Python-based web scraper for a darkweb marketplace on the Tor network.☆32Updated 9 months ago
- Monitor your target continuously for new subdomains!☆26Updated 2 years ago