derrumbe / Ruse
Mobile camera-based application that attempts to alter photos to preserve their utility to humans while making them unusable for facial recognition systems.
β34Updated last year
Alternatives and similar repositories for Ruse:
Users that are interested in Ruse are comparing it to the libraries listed below
- π Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.shβ34Updated 2 years ago
- β51Updated 4 years ago
- Create visualization from Shodan queryβ72Updated 3 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windowsβ15Updated 3 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writteβ¦β27Updated 2 years ago
- Collect information about leaks for particular domain in IntelX and present it on a tree view graph.β28Updated 3 years ago
- Post-exploitation toolβ26Updated 4 years ago
- Free Advance encryptor for Anon Cloudβ17Updated 2 years ago
- A golang tool that uses the dehashed.com API to search for compromised assets.β9Updated 4 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.β23Updated 3 years ago
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorieβ¦β60Updated 3 years ago
- Custom pentesting toolsβ25Updated 4 years ago
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.β21Updated 2 years ago
- ScanMan is the amalgamation of Masscan, Metasploit Framework (MSF) and Nmap Scripting Engine (NSE).β51Updated 2 weeks ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is uβ¦β30Updated 4 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.β60Updated 3 years ago
- Small python script wrapper for automating hashcat commandsβ37Updated 4 years ago
- Central IoC scanner based on Lokiβ20Updated 3 years ago
- β69Updated last year
- Modular framework to exploit UPS devicesβ63Updated 2 years ago
- A simple python script to exploit vulnerable Firebase Database. If the owner of the app have set the security rules as true for both "reaβ¦β20Updated 11 months ago
- Classic Web shell upload techniques & Web RCE techniquesβ27Updated 4 months ago
- Finding sensitive information in the trimmed parts of cropped imagesβ29Updated 3 years ago
- Just another vulnerable web application.β35Updated 8 months ago
- Miscellaneous tools for BloodHoundβ18Updated 3 years ago
- A simple Python trojan that encrypts the victim's file system and demands ransom so that an attacker can hit Taco Bell with no financial β¦β14Updated 3 years ago
- Bash script for CTF automating basic enumerationβ45Updated 3 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, β¦β17Updated 2 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.β62Updated 2 years ago
- β42Updated 2 years ago