derrumbe / Ruse
Mobile camera-based application that attempts to alter photos to preserve their utility to humans while making them unusable for facial recognition systems.
☆34Updated last year
Alternatives and similar repositories for Ruse:
Users that are interested in Ruse are comparing it to the libraries listed below
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- Free Advance encryptor for Anon Cloud☆17Updated last year
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.☆21Updated 2 years ago
- ☆69Updated last year
- Pivot your way deeper into computer networks with SSH compromised machines.☆62Updated 2 years ago
- Create visualization from Shodan query☆71Updated 3 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆72Updated last month
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 2 years ago
- ☆51Updated 3 years ago
- A golang tool that uses the dehashed.com API to search for compromised assets.☆8Updated 3 years ago
- Central IoC scanner based on Loki☆20Updated 3 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 2 years ago
- Post-exploitation tool☆26Updated 3 years ago
- WebHook for Red Team☆24Updated 3 years ago
- A simple python script to exploit vulnerable Firebase Database. If the owner of the app have set the security rules as true for both "rea…☆19Updated 8 months ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆118Updated 6 months ago
- An Encrypted File transfer via AES-256-CBC☆43Updated 3 years ago
- Image Payload Creating/Injecting tools☆12Updated 3 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆14Updated 3 years ago
- Just another vulnerable web application.☆35Updated 5 months ago
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆58Updated 3 years ago
- Modular framework to exploit UPS devices☆62Updated last year
- Collect information about leaks for particular domain in IntelX and present it on a tree view graph.☆28Updated 3 years ago
- Super organized and flexible script for sending phishing campaigns☆54Updated 3 years ago