greentfrapp / apple-neuralhash-attackLinks
Demonstrates iterative FGSM on Apple's NeuralHash model.
☆16Updated 4 years ago
Alternatives and similar repositories for apple-neuralhash-attack
Users that are interested in apple-neuralhash-attack are comparing it to the libraries listed below
Sorting:
- Rootkit breaker - experimental Linux anti-rootkit tool based on kprobes☆12Updated 5 years ago
- Pickle decompiler plugin for Radare2☆18Updated 2 years ago
- Network Traffic Fuzzer☆18Updated 9 months ago
- Reference of Vehicle Security。☆13Updated 4 years ago
- Pwnkit Exploit (CVE-2021-4034), no download capabilty? Copy and paste it!☆18Updated 3 years ago
- PoC for PixieFail vulnerabilities☆24Updated last year
- CVE-2021-42008: Exploiting A 16-Year-Old Vulnerability In The Linux 6pack Driver☆31Updated 3 years ago
- Offensive cybersecurity toolkit for vulnerability analysis and penetration testing of OBD-II devices.☆22Updated 3 weeks ago
- The public release of LeftoverLocals code☆70Updated last year
- VM escape (QEMU, VirtualBox, VMware)☆17Updated 3 years ago
- ☆70Updated 2 years ago
- Hide some secret 😎 data in a Neural Network - text, malicious software or watermark your NN☆40Updated 3 years ago
- Attack & Defense CTF dashboard☆16Updated 4 years ago
- ☆16Updated 3 years ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆17Updated 4 years ago
- LaserShark: Establishing Fast, Bidirectional Communication into Air-Gapped Systems (ACSAC 2021)☆67Updated 3 years ago
- ☆11Updated 4 years ago
- Fastgcd is a C implementation of an efficient algorithm to compute the pairwise GCDs of a collection of integers. The algorithm is due to…☆17Updated last year
- A tool to perform so called BGE attack☆25Updated 4 months ago
- Attempts at fuzzing Python unpicklers☆39Updated last year
- This tool calculates tricky canonical huffman histogram for CVE-2023-4863.☆27Updated last year
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- Project Vault Range PoC: Know your enemy and yourself to build better defense-in-depth solution!☆47Updated 6 months ago
- A list of backdoor samples I find online.☆13Updated 5 years ago
- Hacking the Linux kernel☆15Updated 2 years ago
- Kernel Read Write Execute☆46Updated 9 months ago
- ☆24Updated 4 years ago
- PoC code and tools for Black Hat USA 2024☆24Updated last year
- Repository for the Framing Frames publication: security context and transmit queue manipulations, client isolation bypasses, and more.☆47Updated 2 years ago
- ☆16Updated last year