greentfrapp / apple-neuralhash-attackLinks
Demonstrates iterative FGSM on Apple's NeuralHash model.
☆16Updated 3 years ago
Alternatives and similar repositories for apple-neuralhash-attack
Users that are interested in apple-neuralhash-attack are comparing it to the libraries listed below
Sorting:
- Pickle decompiler plugin for Radare2☆18Updated 2 years ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆16Updated 4 years ago
- Fuzz Network Traffic☆18Updated 7 months ago
- USB device hardware core with modified behaviour capable of injecting transmissions on behalf of other devices☆35Updated 8 months ago
- Offensive cybersecurity toolkit for vulnerability analysis and penetration testing of OBD-II devices.☆22Updated 11 months ago
- Burp Suite Extension useful to inspect UPnP security☆16Updated 3 years ago
- DC540 hacking challenge 0x00002 [MicroPython CTF].☆13Updated last year
- Pwnkit Exploit (CVE-2021-4034), no download capabilty? Copy and paste it!☆18Updated 3 years ago
- PoC for PixieFail vulnerabilities☆23Updated last year
- Exactly what it sounds like, which is something rad☆22Updated 2 years ago
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps …☆24Updated 3 years ago
- Some security by obscurity using port-jumping.☆14Updated last month
- NAT Slipstream attack code samples☆48Updated 4 years ago
- A 2-in-1 toolset of https://github.com/x0rz/EQGRP_Lost_in_Translation and https://github.com/x0rz/EQGRP☆25Updated 6 years ago
- μετάμάσκα - malevolent payload classifier☆24Updated 2 years ago
- Configure SPI flash write protection.☆24Updated 5 years ago
- ☆11Updated 3 years ago
- CVE-2021-42008: Exploiting A 16-Year-Old Vulnerability In The Linux 6pack Driver☆31Updated 3 years ago
- USENIX 2023 Artifacts☆11Updated 2 years ago
- Spoofing signatures in Office Open XML Documents (Word, Excel, Powerpoint)☆26Updated 2 years ago
- ☆17Updated last year
- Reference of Vehicle Security。☆13Updated 4 years ago
- Encrypt your git repo...☆48Updated 3 years ago
- Chequea si tu firewall es vulnerable a CVE-2024-21762 (RCE sin autenticación)☆13Updated last month
- A Simple CVE-2022-39299 PoC exploit generator to bypass authentication in SAML SSO Integrations using vulnerable versions of passport-sam…☆19Updated 2 years ago
- Tool for profiling heap usage and memory management☆27Updated 3 years ago
- Attack & Defense CTF dashboard☆15Updated 3 years ago
- HTTP request smuggling attack helper/CLI tools to manipulate HTTP packets☆36Updated 2 years ago
- ☆17Updated 3 years ago
- Rootkit breaker - experimental Linux anti-rootkit tool based on kprobes☆12Updated 4 years ago