Demonstrates iterative FGSM on Apple's NeuralHash model.
☆16Aug 19, 2021Updated 4 years ago
Alternatives and similar repositories for apple-neuralhash-attack
Users that are interested in apple-neuralhash-attack are comparing it to the libraries listed below
Sorting:
- Reference of Vehicle Security。☆13Aug 13, 2021Updated 4 years ago
- It's a CLI Unity DLL Injector.☆12Aug 8, 2019Updated 6 years ago
- Subdomain finder☆10Mar 13, 2025Updated 11 months ago
- Burp Suite Extension useful to inspect UPnP security☆16Nov 9, 2021Updated 4 years ago
- Attack & Defense CTF dashboard☆16Oct 7, 2021Updated 4 years ago
- burpplugin 根据一遍神贴,实现了一下burp插件版本的小刀,一键生成shell☆14Jul 15, 2019Updated 6 years ago
- A wrapper for memory hacking related functions (WriteProcessMemory, ReadProcessMemory, etc) as well as a DLL injection function and patte…☆17May 29, 2020Updated 5 years ago
- Linux/x86 - Egghunter Reverse TCP Shell dynamic IP and port Shellcode☆12Jul 30, 2021Updated 4 years ago
- jre8u20 gadget☆34May 23, 2021Updated 4 years ago
- QilingLab challenge writeup☆22Sep 25, 2021Updated 4 years ago
- Java XMLDecoder payload generator☆16Jul 27, 2021Updated 4 years ago
- Skywalking远程代码执行漏洞验证☆19Feb 22, 2021Updated 5 years ago
- CTF Challenge☆18Nov 20, 2020Updated 5 years ago
- ☆17Jan 27, 2022Updated 4 years ago
- Implements Coron's simplification of Coppersmith's algorithm☆43Oct 10, 2023Updated 2 years ago
- A small PoC for the recent RCE found in the Goahead Webserver prior to version 5.1.5.☆22Oct 18, 2021Updated 4 years ago
- By manipulating LSASS memory flags like UseLogonCredential and IsCredGuardEnabled, this repo demonstrates how Credential Guard can be byp…☆14May 25, 2025Updated 9 months ago
- The repository accompanying the Buer Emulation workshop☆24Aug 18, 2021Updated 4 years ago
- A Sage implementation of the ROCA attack☆28May 16, 2023Updated 2 years ago
- Automate the process of an S3 bucket subdomain takeover via dangling CNAME record☆26May 20, 2024Updated last year
- Unauthorized Access to Metadata and User Data like CTF☆28Nov 30, 2024Updated last year
- Some CTF Write-ups☆27Feb 7, 2022Updated 4 years ago
- 这资源是作者复现微软签字证书漏洞CVE-2020-0601,结合相关资源及文章实现。推荐大家结合作者博客,理解ECC算法、Windows验证机制,并尝试自己复现可执行文件签名证书和HTTPS劫持的例子。作为网络安全初学者,自己确实很菜,但希望坚持下去,加油!☆30Feb 17, 2020Updated 6 years ago
- (Sim)ulate (Ba)zar Loader☆28Nov 15, 2020Updated 5 years ago
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆35Aug 21, 2023Updated 2 years ago
- AutoVAS is an automated vulnerability analysis system with a deep learning approach.☆35Sep 2, 2021Updated 4 years ago
- Windows Etw LPE☆51Oct 12, 2021Updated 4 years ago
- At some point, I learned about a method to perform a binary search on a file in order to identify its AV signature and change it to bypas…☆36Aug 3, 2020Updated 5 years ago
- UNTOUCHED Unity debugging dlls backup from https://github.com/dnSpy/dnSpy-Unity-mono☆38Mar 28, 2023Updated 2 years ago
- Breaking git with a carriage return and cloning RCE☆50Jul 8, 2025Updated 7 months ago
- Linux kernel LPE practice with an NPD vulnerability☆36Jul 11, 2023Updated 2 years ago
- Prototype Pollution exploits collection☆37Aug 8, 2021Updated 4 years ago
- HTTP request smuggling attack helper/CLI tools to manipulate HTTP packets☆35Sep 23, 2022Updated 3 years ago
- Run PowerShell command without invoking powershell.exe☆35Nov 22, 2021Updated 4 years ago
- Generate DOM clobbering attack vectors for you.☆35Jun 3, 2025Updated 9 months ago
- A slightly more fun way to disable windows defender☆52May 4, 2025Updated 10 months ago
- ☆38Mar 8, 2022Updated 3 years ago
- Godzilla traffic decoder☆46Aug 26, 2021Updated 4 years ago
- ☆12Jan 5, 2026Updated 2 months ago