CyberSecurityUP / DeepNude-Detector
This project is a tool for detecting nudity in images, allowing users to analyze both local images and images from URLs. It utilizes the NudeNet library to classify and detect explicit content. Additionally, it offers an option to automatically censor images identified as inappropriate.
☆11Updated 4 months ago
Alternatives and similar repositories for DeepNude-Detector:
Users that are interested in DeepNude-Detector are comparing it to the libraries listed below
- The Kill-The-Code Python Program provides a robust mechanism for remotely controlling code execution by monitoring a specified URL for a …☆15Updated 5 months ago
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆12Updated last year
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated 9 months ago
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆18Updated 2 years ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆15Updated 2 years ago
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆18Updated last year
- Abusing VirusTotal API to host our C2 traffic, usefull for bypassing blocking firewall rules if VirusTotal is in the target white list , …☆17Updated 2 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 6 months ago
- Modular framework to exploit UPS devices☆62Updated last year
- random scripts and utilities used for pentesting or R&D purposes☆9Updated 10 months ago
- Find open databases - Powered by Binaryedge.io☆12Updated 5 years ago
- medor is an OSINT tool that enables you to discover a WordPress website IP behind a WAF or behind Onion Services.☆10Updated 6 months ago
- BlueTeam, RedTeam, Bug bounty, OSINT, Threat Hunting, Network and Web Recon, Discovery, Enumeration, Vulnerability Mapping, Exploitation,…☆48Updated this week
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆32Updated 2 years ago
- New Framework Red Team Operations☆17Updated 3 years ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆16Updated 2 years ago
- Powershell modules and commands that come in handy for pentests and red team assessments.☆16Updated 6 years ago
- Discord bot for the Shodan API - OSINT tool☆68Updated 10 months ago
- A network logging tool that logs per process activities☆32Updated last year
- Comprehensive adversary emulation tool for security testing on Google Cloud Platform (GCP) environments.☆14Updated 7 months ago
- Simple Shellcode Runner in Rust Language☆17Updated last year
- Capture screenshots of onion services on an onion service.☆50Updated 7 months ago
- A tool designed to analyse email headers☆33Updated 2 years ago
- ☆15Updated 2 years ago
- Cookie - Phishing - Altri strumenti utili - Rendersi Anonimi nel WEB - Messaggistica Sicura☆20Updated 8 months ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- Tactics, Techniques, and Procedures☆25Updated last week
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆20Updated last year
- Terminal based fake identity generator.☆26Updated last year