Determine whether a given video sequence has been manipulated or synthetically generated
☆98Oct 21, 2022Updated 3 years ago
Alternatives and similar repositories for DFSpot-Deepfake-Recognition
Users that are interested in DFSpot-Deepfake-Recognition are comparing it to the libraries listed below
Sorting:
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆20Sep 11, 2023Updated 2 years ago
- vusialization of geo points from photos from vk profile☆48Feb 16, 2022Updated 4 years ago
- CVE-2021-1675 LPE PoC in Nim (PrintNightmare Local Privilege Escalation)☆18Dec 5, 2021Updated 4 years ago
- Automatically fix high dynamic range images☆49Jul 21, 2023Updated 2 years ago
- 🌵 Command and Action routine Server☆16Updated this week
- A python app using kivy and pynput to log and upload mouse dynamics.☆27Apr 24, 2022Updated 3 years ago
- Query GraphSense clusters, details and attribution tag-packs directly in Maltego. By an initial idea of our Swiss Federal Police colleag…☆36Dec 28, 2024Updated last year
- This is a windows maching login page designed using HTML, CSS and JS. This can be used for red teaming or cybersecurity awareness related…☆18Mar 25, 2022Updated 3 years ago
- A sample POC for CVE-2021-30657 affecting MacOS☆30Nov 8, 2021Updated 4 years ago
- Lightweight way to play internet videos on your TV or PC from your phone☆15Jul 3, 2021Updated 4 years ago
- An End to End Encrypted SMS and SMS Tunneling app☆40Apr 27, 2023Updated 2 years ago
- Phishing instagram,vk,tiktok telegram☆71Apr 23, 2023Updated 2 years ago
- Generate your own NFTs☆41Mar 27, 2021Updated 4 years ago
- Machine learning face recognition combined with a drone and osint tools☆43Jun 15, 2020Updated 5 years ago
- A wallpaper daemon☆23May 6, 2025Updated 10 months ago
- Proof of Work protected TCP server.☆29Nov 8, 2023Updated 2 years ago
- Converts binary files of 1C (1CD, cf, epf, efd, etc.) to grepable CSV☆12Feb 12, 2024Updated 2 years ago
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Jan 21, 2020Updated 6 years ago
- Atlassian Confluence Server 7.5.1 Pre-Authorization Arbitrary File Read vulnerability (CVE-2021-26085)☆14Oct 12, 2021Updated 4 years ago
- Mimikatz embedded as classes☆28Oct 25, 2021Updated 4 years ago
- A command-line tool for effortlessly organizing and renaming your music files based on metadata☆91Jul 9, 2025Updated 8 months ago
- Chrome Extension allowing users to preview links and images☆73Apr 6, 2024Updated last year
- A template for standard Maltego transformation☆13Dec 8, 2021Updated 4 years ago
- Search-Scan-Save-Notify☆11May 12, 2025Updated 9 months ago
- WordPress File Upload RCE Exploit☆17Sep 1, 2025Updated 6 months ago
- Blog for SRA-VJTI☆15Jan 28, 2026Updated last month
- Terminal YouTube downloader☆11Feb 13, 2020Updated 6 years ago
- A collaboration effort by the DFIR community to provide definitions (sometimes multiple) for common forensic terms!☆26Dec 1, 2022Updated 3 years ago
- Repository and archive for Killing The Bear Gitbook☆83Aug 15, 2023Updated 2 years ago
- WMEye is a post exploitation tool that uses WMI Event Filter and MSBuild Execution for lateral movement☆369Dec 24, 2021Updated 4 years ago
- https://ve0x10.in/idf-notes-sra/☆13May 27, 2020Updated 5 years ago
- Download images from URLs within a CSV☆13Jan 6, 2021Updated 5 years ago
- App to classify vehicles and subclassify trucks according to number of axels☆13Sep 5, 2020Updated 5 years ago
- ☆14Mar 7, 2023Updated 3 years ago
- Search physical locations for geo tagged photos☆125Dec 7, 2016Updated 9 years ago
- ☆57Dec 17, 2024Updated last year
- Simple tool to visualize and amplify mouse movements☆75May 12, 2021Updated 4 years ago
- Quick OSINT checks for IPs and Domains during triage and investigations.☆31Jun 26, 2024Updated last year
- A tool for plotting processes accessing the network☆91Jul 1, 2022Updated 3 years ago