greentfrapp / apple-neuralhash-attackLinks
Demonstrates iterative FGSM on Apple's NeuralHash model.
☆16Updated 4 years ago
Alternatives and similar repositories for apple-neuralhash-attack
Users that are interested in apple-neuralhash-attack are comparing it to the libraries listed below
Sorting:
- Pickle decompiler plugin for Radare2☆18Updated 2 years ago
- Pwnkit Exploit (CVE-2021-4034), no download capabilty? Copy and paste it!☆18Updated 3 years ago
- Fuzz Network Traffic☆18Updated 8 months ago
- Offensive cybersecurity toolkit for vulnerability analysis and penetration testing of OBD-II devices.☆22Updated last year
- This is a crash for Brave Browser I found in New Years Eve, used to be a 0day when I found it☆16Updated 2 years ago
- Linux kernel LPE practice with an NPD vulnerability☆36Updated 2 years ago
- Rootkit breaker - experimental Linux anti-rootkit tool based on kprobes☆12Updated 4 years ago
- ☆11Updated 3 years ago
- PoC for PixieFail vulnerabilities☆23Updated last year
- The public release of LeftoverLocals code☆68Updated last year
- PoC code and tools for Black Hat USA 2024☆24Updated last year
- A 2-in-1 toolset of https://github.com/x0rz/EQGRP_Lost_in_Translation and https://github.com/x0rz/EQGRP☆25Updated 6 years ago
- Reference of Vehicle Security。☆13Updated 4 years ago
- VM escape (QEMU, VirtualBox, VMware)☆17Updated 3 years ago
- Utility to find hidden Linux kernel modules☆144Updated last month
- A tool to perform so called BGE attack☆25Updated 2 months ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆17Updated 4 years ago
- ☆24Updated 4 years ago
- NAT Slipstream attack code samples☆48Updated 4 years ago
- Burp Suite Extension useful to inspect UPnP security☆16Updated 3 years ago
- USB device hardware core with modified behaviour capable of injecting transmissions on behalf of other devices☆35Updated 9 months ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- Static analysis tool based on clang, which detects source-to-binary information leaks in C and C++ projects☆85Updated 2 years ago
- Repository for the IPvSeeYou talk at Black Hat 2021☆86Updated 3 years ago
- This tool bruteforces the file offset and base load address for a raw binary program file☆15Updated 3 months ago
- Configure SPI flash write protection.☆24Updated 5 years ago
- Checks for tpm vulnerabilities☆37Updated 2 years ago
- Repository for the Framing Frames publication: security context and transmit queue manipulations, client isolation bypasses, and more.☆47Updated 2 years ago
- https://github.com/wcventure/FuzzingPaper☆10Updated 3 years ago
- CVE-2021-42008: Exploiting A 16-Year-Old Vulnerability In The Linux 6pack Driver☆31Updated 3 years ago