CyberSecurityUP / DeepNude-DetectorLinks
This project is a tool for detecting nudity in images, allowing users to analyze both local images and images from URLs. It utilizes the NudeNet library to classify and detect explicit content. Additionally, it offers an option to automatically censor images identified as inappropriate.
☆12Updated 8 months ago
Alternatives and similar repositories for DeepNude-Detector
Users that are interested in DeepNude-Detector are comparing it to the libraries listed below
Sorting:
- The Kill-The-Code Python Program provides a robust mechanism for remotely controlling code execution by monitoring a specified URL for a …☆16Updated 10 months ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- SocialPwned is an OSINT tool that allows to get the emails, from a target, published in social networks such as Instagram, Linkedin and T…☆11Updated 2 years ago
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆20Updated 2 years ago
- Proof of concept denial of service over TOR stress test tool☆41Updated 6 years ago
- A tool designed to analyse email headers☆34Updated 2 years ago
- Red Teaming Tactics and Techniques☆14Updated 3 years ago
- VLAN attacks toolkit☆14Updated 2 years ago
- crawl a website for links and expose all the vulnerable parameters.☆13Updated 2 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago
- Multithread reverse shell listener☆25Updated last year
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆39Updated last year
- Python-based web scraper for a darkweb marketplace on the Tor network.☆32Updated 8 months ago
- Educational repository with source code examples☆12Updated last year
- Conduct forensic investigation of suspicious domains, websites and other dangerous thing without the fear of being infected! A Live opera…☆18Updated 2 years ago
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆13Updated last year
- Ded Security Framework is a tool aimed at security professionals☆35Updated last year
- Retrieve all mails of users related to a git repository, a git user or a git organization☆50Updated last year
- Ransomware for demonstration☆17Updated 2 years ago
- Collection of scripts and other content to make the life of bots and script-kiddies as hard as possible☆46Updated last year
- Introducing the Ransomware Builder – an educational tool with a sleek, modern GUI that makes it easy for anyone to create their own ranso…☆12Updated 10 months ago
- A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticat…☆8Updated last year
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13Updated last year
- ☆15Updated 3 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆23Updated 2 years ago
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆32Updated 2 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆34Updated last month
- It was developed to speed up the processes of SOC Analysts during analysis☆49Updated last year
- The purpose of this tool is to collect all the subdomains using different subdomain finder tools and then filter out those subdomains whi…☆16Updated 2 years ago
- An automated e-mail OSINT tool☆21Updated 3 years ago