greentfrapp / apple-neuralhash-attack
Demonstrates iterative FGSM on Apple's NeuralHash model.
☆15Updated 3 years ago
Related projects: ⓘ
- ManticoreUI support for Ghidra. This is primarily a prototype repository. See the main ManticoreUI repo (https://github.com/trailofbits/M…☆11Updated 2 years ago
- Pickle decompiler plugin for Radare2☆14Updated last year
- PoC for PixieFail vulnerabilities☆19Updated 8 months ago
- Hacking the Linux kernel☆13Updated last year
- A Reverse Engineering Assistant leveraging Retrieval-Augmented Generation (RAG) and the LLaMA-3.1-8B-Instant Large Language Model (LLM). …☆25Updated last month
- A ImHex plugin to ask the almighty Oracle (OpenAI's Davinci AI) for help identifying file formats☆17Updated last year
- A collection of software bug types and articles showcasing the hunt for and exploitation of them.☆20Updated 3 years ago
- 🤖🛡️🔍🔒🔑 Tiny package designed to support red teams and penetration testers in exploiting large language model AI solutions.☆11Updated 4 months ago
- Project Vault Range PoC: Know your enemy and yourself to build better defense-in-depth solution!☆42Updated 2 years ago
- NAT Slipstream attack code samples☆45Updated 3 years ago
- A Linux x86/x86-64 tool to trace registers and memory regions.☆34Updated 2 years ago
- A fuzzor towards Linksys JNAP interfaces☆12Updated 3 years ago
- USENIX 2023 Artifacts☆10Updated last year
- USB device hardware core with modified behaviour capable of injecting transmissions on behalf of other devices☆26Updated 8 months ago
- Lazy Bloodhound is a toy PHP static code analyzer built on tree-sitter☆12Updated 3 years ago
- Reference of Vehicle Security。☆12Updated 3 years ago
- Checks for tpm vulnerabilities☆35Updated last year
- CVE-2021-42008: Exploiting A 16-Year-Old Vulnerability In The Linux 6pack Driver☆29Updated 2 years ago
- 📝 Web security related academic papers collection (just for myself).☆20Updated 3 years ago
- A repo with a listing of binary ninja scripts + plugins (massively inspired by https://github.com/onethawt/idaplugins-list)☆16Updated 7 years ago
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service and versions.☆15Updated 4 months ago
- Automated dynamic security analysis by emulation of IoT firmware images in CI-pipelines.☆11Updated 3 years ago
- Frida plugin for Binary Ninja☆15Updated 5 months ago
- Hide some secret 😎 data in a Neural Network - text, malicious software or watermark your NN☆41Updated 2 years ago
- Tool to perform differential fault analysis attack (DFA) on whiteboxes with external encodings.☆10Updated last year
- Portable (static / old glibc linked) Linux binaries for red-team / blue-team☆14Updated 6 months ago
- Identify VMess packets in network traffic☆12Updated last year
- ☆16Updated last year
- ☆24Updated 3 years ago
- Using EPUBs for the semi-automated evaluation of security and privacy implications of EPUB reading systems.☆28Updated 2 years ago