A simple authentication web page with face recognition and face verification.
☆31Nov 6, 2024Updated last year
Alternatives and similar repositories for face-recognition-auth-reactjs
Users that are interested in face-recognition-auth-reactjs are comparing it to the libraries listed below
Sorting:
- Persistence techniques for windows.☆19Jun 26, 2023Updated 2 years ago
- ☆11May 31, 2021Updated 4 years ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆26Aug 3, 2022Updated 3 years ago
- ☆20Sep 2, 2021Updated 4 years ago
- all random stuff that dont warrant a seperate repo☆12Sep 2, 2022Updated 3 years ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆26Jun 11, 2025Updated 9 months ago
- A small pentesting lab for Azure☆10Apr 19, 2019Updated 6 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆12Oct 6, 2020Updated 5 years ago
- bash script for automating subdomain enumeration process either passive or active☆29Feb 24, 2026Updated 3 weeks ago
- My eJPT exam cheatSheet☆13Nov 9, 2021Updated 4 years ago
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆12Nov 23, 2023Updated 2 years ago
- This tool is an efficient scanner designed to detect Cache Deception vulnerabilities in web servers. It automates the process of testing …☆35Jan 14, 2026Updated 2 months ago
- Windows kernel☆12Oct 15, 2020Updated 5 years ago
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆17Oct 8, 2025Updated 5 months ago
- Simple Shellcode Runner in Rust Language☆18Dec 8, 2023Updated 2 years ago
- my own 2fa bypass methodolgy☆27Sep 22, 2023Updated 2 years ago
- ☆12Nov 22, 2024Updated last year
- Shellcode Loader | xss.is☆13Jul 26, 2024Updated last year
- URL-encode data streams via commandline☆14Oct 26, 2019Updated 6 years ago
- Automatic cloud backup of Kali Linux data☆13Feb 27, 2020Updated 6 years ago
- InSpec profile for Microsoft Windows 10, against DISA's Microsoft Windows 10 Security Technical Implementation Guide (STIG) Version 1, Re…☆15Jan 9, 2025Updated last year
- Super IOCTL Basic Fuzzer☆16Sep 22, 2019Updated 6 years ago
- Obfuscate payloads using IPv4, IPv6, MAC or UUID strings☆23Feb 17, 2024Updated 2 years ago
- Automate the build of a vulnerable AD environment.☆41Aug 19, 2022Updated 3 years ago
- LabVIEW LIB & examples that use custom WinAPI.dll (InteropAssembly that wrapps user32 and shell32 functions)☆12Jul 29, 2021Updated 4 years ago
- ☆17Mar 6, 2023Updated 3 years ago
- nistrich allows you to discover CVEs and their severities belong to IP addresses☆13Dec 28, 2022Updated 3 years ago
- Educational Cybersecurity Gaming Experience☆10Dec 13, 2022Updated 3 years ago
- A support web page for my eJPT / eCPPT Certification Process☆16Jan 18, 2018Updated 8 years ago
- Host ChatGPT locally☆11Jan 15, 2024Updated 2 years ago
- Git and Bash Based Encrypted Remote Interactive Shell (GiBBERISh). For when you cannot use SSH.☆12Apr 23, 2021Updated 4 years ago
- IOCTL++ can be used to make DeviceIoControl requests with arbitrary inputs.☆35Oct 28, 2025Updated 4 months ago
- Repository with simples C binary samples for beginners REs & Defenders☆10May 29, 2024Updated last year
- ☆18Oct 8, 2024Updated last year
- Automatically exported from code.google.com/p/bypass-x64-dse☆21Oct 1, 2015Updated 10 years ago
- DLink DIR-846 Authenticated Remote Code Execution☆18Oct 4, 2023Updated 2 years ago
- Covert data exfiltration and detection using 802.11 beacon stuffing☆16May 27, 2019Updated 6 years ago
- ☆15Apr 29, 2023Updated 2 years ago
- CVE-2021-21972 Unauthorized RCE in VMware vCenter metasploit exploit script☆20Mar 7, 2021Updated 5 years ago