A Machine Learning Model that classifies the data in the images as Sensitive or Non-sensitive.
☆66Apr 18, 2021Updated 5 years ago
Alternatives and similar repositories for Detection-of-Sensitive-Data-Exposure-in-Images
Users that are interested in Detection-of-Sensitive-Data-Exposure-in-Images are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A powerful tool designed for identifying hidden endpoints and sensitive information within JavaScript files on a website.☆30Mar 31, 2026Updated last month
- 基于深度学习的cms识别 训练集☆16Sep 22, 2018Updated 7 years ago
- ☆14Jul 18, 2022Updated 3 years ago
- Sigma is Generic Signature Format for SIEM Systems written by Florian Roth @Neo23x0 and Thomas Patzke. This repository is providing sprea…☆33Oct 16, 2019Updated 6 years ago
- dankAlerts is powered by Sysmon and Memes. Would you notice if a suspicious process was recorded in the event log?☆18Jun 24, 2020Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ARP cache poisoning implementation using Scapy☆13Jul 14, 2019Updated 6 years ago
- ☆16Jul 14, 2020Updated 5 years ago
- 向TSRC投稿的文章,对应的pdf,代码和思维导图☆21Sep 18, 2020Updated 5 years ago
- Tools using SNMP to get system info, like average CPU load, memory statistics, disk statistics, network statistics etc.☆10Jun 14, 2015Updated 10 years ago
- Protocol Inspection and State Machine Analysis☆22May 26, 2018Updated 7 years ago
- access zap proxy api using ruby☆12Mar 2, 2018Updated 8 years ago
- Burp Suite plugin created for using Collaborator tool during manual testing☆19Feb 4, 2022Updated 4 years ago
- poc or exp of some famous vulnerability☆14Mar 5, 2014Updated 12 years ago
- API fuzzer that exposes security flaws by sending malformed inputs☆16Sep 4, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- The easy way to create a working directory with standard report template files for common security scenarios: penetration testing, CTF, t…☆16Jan 5, 2024Updated 2 years ago
- Exploit codes for rconfig <= 3.9.4☆11Mar 17, 2020Updated 6 years ago
- 该工具用于把Openresty(Nginx+Lua) 请求参数和响应 dump出来,用于旁路HTTP流量分析、风控、资产识别、API数据泄露等等☆26Jul 8, 2021Updated 4 years ago
- AI Powered Sensitive Information Detection☆20Mar 13, 2024Updated 2 years ago
- Automatic reversed shell detecting and defensing☆52Oct 25, 2018Updated 7 years ago
- 一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972/31656以及log4j,提供一键上传webs…☆12Dec 18, 2023Updated 2 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Aug 2, 2019Updated 6 years ago
- PoC for Scala and Groovy☆14Apr 4, 2016Updated 10 years ago
- POC for XStream RCE☆13Dec 23, 2013Updated 12 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Challenge Python☆19Apr 26, 2023Updated 3 years ago
- Autoinstall T-Pot on Ubuntu 16.04☆27Aug 1, 2018Updated 7 years ago
- python audit tool 审计 注入 inject☆34Feb 25, 2016Updated 10 years ago
- "A Practical Recipe for Hardware Implants" presentation materials.☆13Nov 10, 2020Updated 5 years ago
- LINUX安全检查脚本,支持centos5,centos6,ubuntu☆184Jan 24, 2017Updated 9 years ago
- Password and email checker. It is your password or email compromissed? Check it now!☆10Dec 8, 2022Updated 3 years ago
- SLSA Proposals☆12Jan 29, 2024Updated 2 years ago
- PoC List☆10Sep 4, 2022Updated 3 years ago
- Tiny WiFi sniffer with Scapy for MAC OS X☆22Oct 18, 2014Updated 11 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆40Jul 9, 2019Updated 6 years ago
- A Golang tool to whitelist ASN's based on organization name☆15Mar 7, 2022Updated 4 years ago
- Extract username and passwords from IPTV urls☆12Nov 8, 2025Updated 5 months ago
- Network Security Vulnerability Manage☆130May 15, 2023Updated 2 years ago
- iOS traffic interception framework which route all device HTTP/HTTPS traffic through Burp Suite via a system-wide VPN tunnel☆43Feb 15, 2026Updated 2 months ago
- A Simple Network Stream Recorder☆35Mar 23, 2019Updated 7 years ago
- A driver that supports communication between a Windows guest and HyperWin☆15Jan 6, 2021Updated 5 years ago