Face Recognition Security
☆184Jan 30, 2024Updated 2 years ago
Alternatives and similar repositories for FaceRecognitionSecurity
Users that are interested in FaceRecognitionSecurity are comparing it to the libraries listed below
Sorting:
- Machine Learning (Easy to Hard step by step)☆49Mar 11, 2020Updated 5 years ago
- Send messages to any person in any time how much you want.☆506Mar 13, 2024Updated last year
- Get All Registered Wifi Passwords from Target Computer.☆697Jan 30, 2024Updated 2 years ago
- Python Projects☆25Feb 2, 2020Updated 6 years ago
- My collection of awesome resources, tools, and other shiny things for cyber security stuffs.☆17Aug 31, 2018Updated 7 years ago
- Machine Learning Model to detect hidden malwares and phase changing malwares.It predicts the date of the next probable attack of the malw…☆13Apr 30, 2020Updated 5 years ago
- A tool programmed to shorten links/mask links☆11Oct 17, 2021Updated 4 years ago
- Ubuntu stealer, steal ubuntu information in local pc☆21Jan 16, 2020Updated 6 years ago
- ip-keyloger☆10Jan 9, 2026Updated 2 months ago
- Identify connection of sessions for social engineering attacks.☆58Nov 15, 2016Updated 9 years ago
- Scripts I have written to perform various IT Security admin tasks. From validating findings to performing automated attacks☆20Mar 12, 2025Updated 11 months ago
- Simple network tools written with Scapy.☆23Mar 22, 2016Updated 9 years ago
- SIP hacking tools and scripts☆23Nov 20, 2020Updated 5 years ago
- The CyberSecurity Framework (CSF for short) is a local Python3 scripting package which aims directly on Cyber Security auditing, where yo…☆41Oct 28, 2017Updated 8 years ago
- A Proof of Concept (PoC) IRC backdoor written in Python☆11Jan 29, 2021Updated 5 years ago
- ARP Exploitation in Python☆10Feb 19, 2017Updated 9 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- Decrypt Matrix42 Empirum /EIS Passwords☆14Mar 31, 2021Updated 4 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Aug 31, 2019Updated 6 years ago
- This project is based on detecting phishing/fraud/malicious website using Random Forest Classification formula. Implemented using Python …☆28Oct 2, 2020Updated 5 years ago
- GitleaksVerifier is a Python-based verification tool designed to enhance the functionality of Gitleaks by rigorously validating secrets f…☆29Mar 9, 2025Updated last year
- Secure destruction of sensitive virtual data, temporary files and swap partitions☆76Jan 16, 2023Updated 3 years ago
- this is a small script for extracting questions from try hack me room ,and creating a MD file☆13Mar 6, 2023Updated 3 years ago
- i will post updates on my instagram @unkn0wn_bali tufhub - a hacking framework with all kinds of bruteforce, info gather, dos attack,…☆13Nov 28, 2018Updated 7 years ago
- Short Python script that attempts to neuter USB Rubber Duckies.☆13Jun 25, 2019Updated 6 years ago
- ☆49Jan 16, 2026Updated last month
- This tool audits a website before hand and can exploit vulnerabilities if the website scanned has any.☆14Jul 3, 2013Updated 12 years ago
- Security test tool for Blind XSS☆26Mar 5, 2020Updated 6 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆15Jan 17, 2020Updated 6 years ago
- This project exploits Microsoft's Skype vulneribility and gets any remote user's IP address.☆10Jan 15, 2015Updated 11 years ago
- keylogger + cryptojacking extension chrome and mozilla ,basic malware browser Keylogger capture credentials,IP ,and send inormations to a…☆33Sep 21, 2020Updated 5 years ago
- Argus Advanced Remote & Local Keylogger For macOS and Windows☆140Oct 3, 2023Updated 2 years ago
- Set and get a value☆14Oct 24, 2021Updated 4 years ago
- python keylogger and spying malware .☆15Apr 24, 2025Updated 10 months ago
- Pdf File : Exfiltration and Uploading DATA by DNS Traffic (AAAA Records)☆10Jun 7, 2023Updated 2 years ago
- A list to discover work of red team tooling and methodology for penetration testing and security assessment☆77Mar 8, 2019Updated 7 years ago
- This is a tutorial to help people make Discord bots.☆14Feb 20, 2026Updated 2 weeks ago
- Simple tool to scanning sql injection vulnerability, easy to use!!☆14Oct 21, 2019Updated 6 years ago
- Powershell hacking☆12Dec 29, 2017Updated 8 years ago