greentfrapp / apple-neuralhash-attackLinks
Demonstrates iterative FGSM on Apple's NeuralHash model.
☆16Updated 3 years ago
Alternatives and similar repositories for apple-neuralhash-attack
Users that are interested in apple-neuralhash-attack are comparing it to the libraries listed below
Sorting:
- PoC for PixieFail vulnerabilities☆23Updated last year
- Pickle decompiler plugin for Radare2☆18Updated last year
- USB device hardware core with modified behaviour capable of injecting transmissions on behalf of other devices☆35Updated 7 months ago
- ☆11Updated 3 years ago
- A migration for the page table entry based side-channel attack agains SGX enclaves.☆17Updated 5 months ago
- ☆31Updated 4 years ago
- A tool to perform so called BGE attack☆24Updated last month
- DC540 hacking challenge 0x00002 [MicroPython CTF].☆13Updated last year
- Tool to perform differential fault analysis attack (DFA) on whiteboxes with external encodings.☆12Updated 2 years ago
- Pwnkit Exploit (CVE-2021-4034), no download capabilty? Copy and paste it!☆18Updated 3 years ago
- A MBR Fuzzer☆29Updated last year
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- The Keccak hash algorithm implemented inside of a RAR archive using the RAR filter assembly language☆23Updated 10 years ago
- GUI manager for network tunnels developed for Command and Control systems.☆11Updated 2 years ago
- ☆17Updated last year
- Offensive cybersecurity toolkit for vulnerability analysis and penetration testing of OBD-II devices.☆22Updated 10 months ago
- Fuzz Network Traffic☆18Updated 6 months ago
- A 2-in-1 toolset of https://github.com/x0rz/EQGRP_Lost_in_Translation and https://github.com/x0rz/EQGRP☆24Updated 5 years ago
- Disassembly Generation and Processing for JARV1S☆14Updated 2 months ago
- POC of CVE-2023-35086 only DoS☆45Updated last year
- Containing vulnerabilities I've discovered and maybe CVE☆18Updated 2 years ago
- NAT Slipstream attack code samples☆48Updated 4 years ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆16Updated 4 years ago
- Read only mirror - No pull requests☆19Updated 4 years ago
- This repo includes the artifacts for the NDSS 2025 paper "Wallbleed: A Memory Disclosure Vulnerability in the Great Firewall of China": h…☆32Updated 4 months ago
- Just Enough C2 - A simple but effective server and implant☆9Updated 3 years ago
- Turning Your Computer Into a GPS Tracker With Apple Maps☆18Updated last year
- Configure SPI flash write protection.☆24Updated 5 years ago
- KeyTrap (DNSSEC)☆41Updated last year
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆73Updated 4 years ago