evilsocket / ergo-planes-detectorLinks
π§ βοΈ An ergo based project that relies on a convolutional neural network to detect airplanes from satellite imagery.
β44Updated 6 years ago
Alternatives and similar repositories for ergo-planes-detector
Users that are interested in ergo-planes-detector are comparing it to the libraries listed below
Sorting:
- Automatically get internetz from access points that have MAC based filtering enabledβ57Updated 7 years ago
- Leveraging CVE-2018-19788 without root shellsβ19Updated 7 years ago
- Finds sensitive stuff in your git repository by specifying terms to look forβ31Updated 7 years ago
- Automatically parses and attacks BloodHound-generated graphsβ42Updated 7 years ago
- Proof of Concept for CVE-2018-11776β21Updated 7 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.β22Updated 8 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwordsβ51Updated 8 years ago
- β39Updated 7 years ago
- A repository of silly scada and ICS knick knack tools.β12Updated 8 years ago
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.β10Updated 6 years ago
- DNS Botnet Server and Clientβ34Updated 4 months ago
- Password Guessing for different Web Portalsβ29Updated 7 years ago
- Search Nmap and Metasploit scanning scripts.β54Updated 8 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLYβ23Updated 7 years ago
- Post-exploitation scripts for OS X persistence and privescβ73Updated 8 years ago
- Peanuts is a free and open source wifi tracking tool. Based on the SensePosts Snoopy-NG project that is now closed.β69Updated 7 years ago
- Simple mods to wpa_supplicant to allow more efficient online brutingβ19Updated 6 years ago
- Wax is a mediocre fuzzer I'm prototyping to test some ideas and get rid of others.β18Updated 7 years ago
- All related files and slides for past talksβ44Updated last month
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports andβ¦β55Updated 8 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.β25Updated 8 years ago
- Automated Brute-Force Login Attacks Against EAP Networks.β58Updated 5 years ago
- Plaintext Password harvesting from Azure Windows VMsβ68Updated 7 years ago
- Find plaintext credentials from emails in bulk from password dumps, and generate emails on the fly.β49Updated 6 years ago
- ssh session type for metasploitβ101Updated 2 years ago
- Rogue AP killerβ91Updated 7 years ago
- Network based protocol fuzzerβ74Updated 3 years ago
- Enterprise WPA Wireless Tool Suiteβ87Updated 3 years ago
- Ratched is a transparent Man-in-the-Middle TLS proxy intended for penetration testingβ33Updated 4 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugsβ23Updated 6 years ago