Shohruh72 / FaceIDView external linksLinks
Face Identification using ONNX Runtime
☆13Jul 4, 2024Updated last year
Alternatives and similar repositories for FaceID
Users that are interested in FaceID are comparing it to the libraries listed below
Sorting:
- Final assignment for the course Data Visualization with Python, part of IBM Data Science Professional Certification on Coursera☆11Jun 22, 2020Updated 5 years ago
- A simple very little blockchain, just for learning.☆27Dec 2, 2019Updated 6 years ago
- ☆14May 14, 2022Updated 3 years ago
- Hack The Box OSCP-like VMs writeups☆11Oct 11, 2020Updated 5 years ago
- It is a ML based project developed in python language. It detect and recognize the face and mark attendance of that person. It's good poi…☆10Aug 13, 2023Updated 2 years ago
- WP Juicer Tool for quick scanning of confidential information on WordPress endpoints.☆10Apr 30, 2024Updated last year
- Network scanning tool designed to detect and report changes in open ports and services over time☆12Oct 16, 2025Updated 3 months ago
- ☆16Aug 25, 2025Updated 5 months ago
- Smart and efficient tool to automate open redirect detection at scale.☆10Mar 21, 2022Updated 3 years ago
- bug bounty☆11Aug 13, 2023Updated 2 years ago
- This repository is a collection of notes, links, tutorials, and experiences aimed at helping others. If you find it useful, please consid…☆18Jun 24, 2025Updated 7 months ago
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆15Sep 10, 2024Updated last year
- ☆11Aug 25, 2023Updated 2 years ago
- A lightweight Python HTTP server with fuzzy filename matching and automatic fallback to directory listing.☆13Aug 28, 2025Updated 5 months ago
- A lightweight Python tool to analyze PCAP files and generate network traffic reports. It detects traffic patterns, security concerns, and…☆18Sep 25, 2024Updated last year
- LibreHealth v2.0.0 suffers from an authenticated file upload vulnerability allowing remote attackers to gain remote code execution (RCE) …☆13Jul 19, 2020Updated 5 years ago
- Uma lista de recursos para quem deseja aprender sobre Physical Pentesting☆12Jul 28, 2025Updated 6 months ago
- this repo contains all nuclei templates for particular vulnerability that i used mosty while hunting..☆10Aug 15, 2024Updated last year
- Attack Active Directory Trusts with a single tool☆14Jan 15, 2025Updated last year
- A deliberately vulnerable website used to showcase Dastardly from Burp Suite☆10Oct 6, 2025Updated 4 months ago
- Remote Task Scheduler Enumeration☆13Jul 9, 2024Updated last year
- This PowerShell script applies a memory patch to bypass the Antimalware Scan Interface (AMSI), allowing unrestricted execution of PowerSh…☆13Jun 2, 2024Updated last year
- Here you find the complete list of enrichments and extractionsfor Ubikron.☆33Dec 15, 2025Updated last month
- It's the collection of all common Question and answers that can possibly come in your exam, if you just complete these question's you wil…☆12Mar 26, 2023Updated 2 years ago
- A collection of 10 network security tools using Scapy for traffic analysis, penetration testing, and network manipulation. Ideal for cybe…☆16Oct 20, 2024Updated last year
- ☆11Feb 6, 2023Updated 3 years ago
- DEFCON 33 Workshop - Open Source Malware 101 - Everything you always wanted to know about npm malware (and more)☆15Aug 8, 2025Updated 6 months ago
- ☆11May 15, 2020Updated 5 years ago
- Hallucinate is a trojan malware (for educational purposes) similar to Maya Gold.scr and Mist. The source code will be released after Ende…☆13Jun 8, 2022Updated 3 years ago
- This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking / pe…☆15Nov 11, 2023Updated 2 years ago
- AI modular structure that provides automation-based attack and penetration☆14May 10, 2024Updated last year
- A cybersecurity challenge, based on a real world finding☆12Jul 11, 2024Updated last year
- Chat with your PDFs or text files using ChatGPT with a HTMX web UI☆13Jul 19, 2023Updated 2 years ago
- Proof Of Concept code for OctoberCMS Auth Bypass CVE-2021-32648☆12Jan 14, 2022Updated 4 years ago
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- These are a select few projects related to Big Data Analytics and Management. The projects listed are a combination of both small and big…☆11Oct 11, 2019Updated 6 years ago
- Trojan written in C++ for Windows☆20Mar 12, 2024Updated last year
- Secure Chatting Application developed by PHP and JavaScript.☆12Jul 1, 2022Updated 3 years ago
- Methodoloy for pentesting web applications.☆10Aug 18, 2022Updated 3 years ago