CyberSecurityUP / DeepNude-DetectorLinks
This project is a tool for detecting nudity in images, allowing users to analyze both local images and images from URLs. It utilizes the NudeNet library to classify and detect explicit content. Additionally, it offers an option to automatically censor images identified as inappropriate.
☆18Updated last year
Alternatives and similar repositories for DeepNude-Detector
Users that are interested in DeepNude-Detector are comparing it to the libraries listed below
Sorting:
- Configure FireFox with Security and Intelligance features for OSINT and Security Investigations.☆17Updated last year
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆41Updated 2 years ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆17Updated 3 years ago
- Red Teaming Tactics and Techniques☆13Updated 3 years ago
- The Kill-The-Code Python Program provides a robust mechanism for remotely controlling code execution by monitoring a specified URL for a …☆18Updated last year
- Ransomware for demonstration☆18Updated 2 years ago
- Ransomware groups posts☆43Updated this week
- Python-based web scraper for a darkweb marketplace on the Tor network.☆38Updated last year
- Modular framework to exploit UPS devices☆65Updated 2 years ago
- Capture screenshots of onion services on an onion service.☆73Updated last year
- It was developed to speed up the processes of SOC Analysts during analysis☆47Updated last year
- Multithread reverse shell listener☆26Updated last year
- List of sources for cybersecurity news☆40Updated 3 years ago
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions☆17Updated 3 years ago
- 🧬 Extract and analyze contributors info from git repos☆83Updated 2 years ago
- Extendable Python script handler for automating penetration testing.☆39Updated 2 years ago
- reveal origins behind reverse proxies & hidden services 👀 🧅 💻☆37Updated 4 months ago
- Source of swisskyrepo.github.io - Public☆26Updated 5 months ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆46Updated last year
- Abusing VirusTotal API to host our C2 traffic, usefull for bypassing blocking firewall rules if VirusTotal is in the target white list , …☆34Updated 3 years ago
- Methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory.☆10Updated 3 years ago
- Tor onion address lookup☆58Updated 4 months ago
- Enumeration & fingerprint tool☆24Updated last year
- Phishing Reverse Proxy with MFA bypass☆17Updated 2 years ago
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆17Updated last year
- Proof of concept denial of service over TOR stress test tool☆42Updated 7 years ago
- Maltego Transforms for WhatsMyName☆67Updated 2 years ago
- ARP Spoofing Defender is a project designed to protect local networks from ARP Spoofing attacks. ARP Spoofing Defender provides mechanism…☆23Updated last month
- Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The…☆11Updated 4 years ago
- Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends e…☆26Updated 2 years ago