A simple authentication web page with face recognition and face verification.
☆32Nov 6, 2024Updated last year
Alternatives and similar repositories for face-recognition-auth-reactjs
Users that are interested in face-recognition-auth-reactjs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Persistence techniques for windows.☆19Jun 26, 2023Updated 2 years ago
- ☆11May 31, 2021Updated 4 years ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆26Aug 3, 2022Updated 3 years ago
- ☆20Sep 2, 2021Updated 4 years ago
- GRC (Governance, Risk and Compliance) Software, to manage risks and controls. It is based in best practices and helps organizations to ma…☆28Mar 8, 2023Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- all random stuff that dont warrant a seperate repo☆12Sep 2, 2022Updated 3 years ago
- Exploit Research & Development - Ported Exploits☆11Jul 22, 2017Updated 8 years ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆26Jun 11, 2025Updated 10 months ago
- A small pentesting lab for Azure☆10Apr 19, 2019Updated 6 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆12Oct 6, 2020Updated 5 years ago
- bash script for automating subdomain enumeration process either passive or active☆29Feb 24, 2026Updated last month
- My eJPT exam cheatSheet☆13Nov 9, 2021Updated 4 years ago
- Application for detecting command and control (C2) communication through network traffic analysis.☆16May 12, 2023Updated 2 years ago
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆12Nov 23, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- This tool is an efficient scanner designed to detect Cache Deception vulnerabilities in web servers. It automates the process of testing …☆35Jan 14, 2026Updated 2 months ago
- Windows kernel☆12Oct 15, 2020Updated 5 years ago
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆17Oct 8, 2025Updated 6 months ago
- Simple Shellcode Runner in Rust Language☆18Dec 8, 2023Updated 2 years ago
- my own 2fa bypass methodolgy☆27Sep 22, 2023Updated 2 years ago
- ☆12Nov 22, 2024Updated last year
- Shellcode Loader | xss.is☆13Jul 26, 2024Updated last year
- URL-encode data streams via commandline☆14Oct 26, 2019Updated 6 years ago
- Automatic cloud backup of Kali Linux data☆13Feb 27, 2020Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Obfuscate payloads using IPv4, IPv6, MAC or UUID strings☆23Feb 17, 2024Updated 2 years ago
- Automate the build of a vulnerable AD environment.☆41Aug 19, 2022Updated 3 years ago
- ☆17Mar 6, 2023Updated 3 years ago
- nistrich allows you to discover CVEs and their severities belong to IP addresses☆13Dec 28, 2022Updated 3 years ago
- Educational Cybersecurity Gaming Experience☆10Dec 13, 2022Updated 3 years ago
- A support web page for my eJPT / eCPPT Certification Process☆16Jan 18, 2018Updated 8 years ago
- Host ChatGPT locally☆11Jan 15, 2024Updated 2 years ago
- Git and Bash Based Encrypted Remote Interactive Shell (GiBBERISh). For when you cannot use SSH.☆12Apr 23, 2021Updated 4 years ago
- IOCTL++ can be used to make DeviceIoControl requests with arbitrary inputs.☆35Oct 28, 2025Updated 5 months ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Repository with simples C binary samples for beginners REs & Defenders☆10May 29, 2024Updated last year
- Research developed by Allele Security Intelligence.☆17Jul 21, 2025Updated 8 months ago
- My Offensive Security OSWA certification experience and my personal opinion what helps in preparation for the exam☆44Jul 13, 2023Updated 2 years ago
- ☆18Oct 8, 2024Updated last year
- Automatically exported from code.google.com/p/bypass-x64-dse☆21Oct 1, 2015Updated 10 years ago
- DLink DIR-846 Authenticated Remote Code Execution☆18Oct 4, 2023Updated 2 years ago
- Covert data exfiltration and detection using 802.11 beacon stuffing☆15May 27, 2019Updated 6 years ago