CyberSecurityUP / DeepNude-DetectorLinks
This project is a tool for detecting nudity in images, allowing users to analyze both local images and images from URLs. It utilizes the NudeNet library to classify and detect explicit content. Additionally, it offers an option to automatically censor images identified as inappropriate.
☆17Updated last year
Alternatives and similar repositories for DeepNude-Detector
Users that are interested in DeepNude-Detector are comparing it to the libraries listed below
Sorting:
- Ransomware for demonstration☆18Updated 2 years ago
- Modular framework to exploit UPS devices☆66Updated 2 years ago
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions☆17Updated 3 years ago
- reveal origins behind reverse proxies & hidden services 👀 🧅 💻☆37Updated 2 months ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆23Updated last year
- Red Teaming Tactics and Techniques☆13Updated 3 years ago
- Fuxsociety Mr Robot 2.1☆28Updated 2 years ago
- Tor onion address lookup☆55Updated 2 months ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆17Updated 3 years ago
- Capture screenshots of onion services on an onion service.☆72Updated last year
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆39Updated 2 years ago
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆18Updated last year
- Multithread reverse shell listener☆26Updated last year
- The Kill-The-Code Python Program provides a robust mechanism for remotely controlling code execution by monitoring a specified URL for a …☆17Updated last year
- Facial Recognition and its dangers for Special Forces Operatives☆24Updated 2 years ago
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆19Updated 2 years ago
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆17Updated last year
- Self replicating and automatically spreading SSH worm that recovers login credentials☆55Updated 2 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆35Updated 4 years ago
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13Updated last year
- It was developed to speed up the processes of SOC Analysts during analysis☆47Updated last year
- Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends e…☆26Updated 2 years ago
- A tool designed to analyse email headers☆38Updated 3 years ago
- Phishing Reverse Proxy with MFA bypass☆17Updated 2 years ago
- Malware Libraries focused in help Malware Development☆27Updated 2 years ago
- Collection of videos of Raids on Cybercriminals☆20Updated 7 months ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated last year
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆44Updated last year
- ARP Spoofing Defender is a project designed to protect local networks from ARP Spoofing attacks. ARP Spoofing Defender provides mechanism…☆20Updated 11 months ago
- Source of swisskyrepo.github.io - Public☆26Updated 3 months ago