greentfrapp / apple-neuralhash-attack
Demonstrates iterative FGSM on Apple's NeuralHash model.
☆16Updated 3 years ago
Alternatives and similar repositories for apple-neuralhash-attack:
Users that are interested in apple-neuralhash-attack are comparing it to the libraries listed below
- Pwnkit Exploit (CVE-2021-4034), no download capabilty? Copy and paste it!☆18Updated 3 years ago
- USB device hardware core with modified behaviour capable of injecting transmissions on behalf of other devices☆33Updated 5 months ago
- Multi-threading wget golang☆13Updated last year
- Post-Exploitation script to exfiltrate 7-zip files☆10Updated 2 years ago
- Reference of Vehicle Security。☆13Updated 3 years ago
- My security advisories☆11Updated 2 weeks ago
- A simple RAT written in Python that communicates with the C&C server over DNS requests.☆11Updated 4 years ago
- ManticoreUI support for Ghidra. This is primarily a prototype repository. See the main ManticoreUI repo (https://github.com/trailofbits/M…☆11Updated 2 years ago
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆16Updated 2 years ago
- Pickle decompiler plugin for Radare2☆18Updated last year
- PoC for PixieFail vulnerabilities☆22Updated last year
- Identify VMess packets in network traffic☆13Updated 2 years ago
- CVE-2021-1675 LPE PoC in Nim (PrintNightmare Local Privilege Escalation)☆19Updated 3 years ago
- This repo includes the artifacts for the NDSS 2025 paper "Wallbleed: A Memory Disclosure Vulnerability in the Great Firewall of China": h…☆29Updated last month
- A tool for adding new lines to files, skipping duplicates and written in Rust!☆14Updated last month
- Pulse Secure VPN mitm Research - CVE-2020-8241, CVE-2020-8239☆23Updated 4 years ago
- Checks for tpm vulnerabilities☆37Updated 2 years ago
- NAT Slipstream attack code samples☆46Updated 3 years ago
- Create an AMI with CobaltStrike and related tools.☆10Updated 2 weeks ago
- Small Helper Library to increase automatically the file descriptors limits for the current process☆23Updated last year
- CVE-2021-42008: Exploiting A 16-Year-Old Vulnerability In The Linux 6pack Driver☆31Updated 2 years ago
- Encryption tool that's heavily inspired by the Rubberhose file system (https://en.wikipedia.org/wiki/Rubberhose_(file_system)).☆53Updated 3 years ago
- ☆13Updated last year
- The Keccak hash algorithm implemented inside of a RAR archive using the RAR filter assembly language☆23Updated 10 years ago
- ☆16Updated 7 months ago
- using rapid7 open dns data search subdomain and reverse ip☆9Updated 3 years ago
- Burp Suite Extension useful to inspect UPnP security☆16Updated 3 years ago
- Package that provides different PE tricks to difficult the reverse engineering of your Windows applications.☆11Updated 4 years ago
- Framework for abuse Apple Find My Network to perform unprivileged device tracking. Will present in USENIX Security '25.☆37Updated 3 weeks ago
- Proof of Concept for WatchGuard Authenticated Arbitrary File Read (CVE-2022-31749)☆10Updated 2 years ago