greentfrapp / apple-neuralhash-attackLinks
Demonstrates iterative FGSM on Apple's NeuralHash model.
☆16Updated 4 years ago
Alternatives and similar repositories for apple-neuralhash-attack
Users that are interested in apple-neuralhash-attack are comparing it to the libraries listed below
Sorting:
- Network Traffic Fuzzer☆17Updated 11 months ago
- Pickle decompiler plugin for Radare2☆18Updated 2 years ago
- PoC for PixieFail vulnerabilities☆25Updated last year
- CVE-2021-42008: Exploiting A 16-Year-Old Vulnerability In The Linux 6pack Driver☆31Updated 3 years ago
- Vulnerabilities advisories and PoC☆18Updated 2 weeks ago
- ☆26Updated 4 years ago
- Rootkit breaker - experimental Linux anti-rootkit tool based on kprobes☆12Updated 5 years ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆16Updated 4 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- Offensive cybersecurity toolkit for vulnerability analysis and penetration testing of OBD-II devices.☆23Updated 2 months ago
- VM escape (QEMU, VirtualBox, VMware)☆17Updated 3 years ago
- Pwnkit Exploit (CVE-2021-4034), no download capabilty? Copy and paste it!☆17Updated 3 years ago
- Integer overflow in FreeType software, which also affects Chrome☆21Updated 3 months ago
- Tool to perform differential fault analysis attack (DFA) on whiteboxes with external encodings.☆16Updated 2 years ago
- NAT Slipstream attack code samples☆48Updated 4 years ago
- Tool for profiling heap usage and memory management☆27Updated 4 years ago
- ☆24Updated 4 years ago
- The public release of LeftoverLocals code☆70Updated last year
- Read only mirror - No pull requests☆20Updated 4 years ago
- Burp Suite Extension useful to inspect UPnP security☆16Updated 4 years ago
- Reference of Vehicle Security。☆13Updated 4 years ago
- Attempts at fuzzing Python unpicklers☆41Updated last year
- Containing vulnerabilities I've discovered and maybe CVE☆19Updated 2 years ago
- ☆16Updated 3 years ago
- Spoofing signatures in Office Open XML Documents (Word, Excel, Powerpoint)☆26Updated 3 years ago
- A standalone python script leveraging ntdll for UEFI variable enumeration. This uses elements from the "chipsec" toolkit for formatting w…☆10Updated 2 years ago
- Static analysis tool based on clang, which detects source-to-binary information leaks in C and C++ projects☆86Updated 3 years ago
- This is a crash for Brave Browser I found in New Years Eve, used to be a 0day when I found it☆17Updated 2 years ago
- ☆11Updated 3 years ago
- USB device hardware core with modified behaviour capable of injecting transmissions on behalf of other devices☆36Updated last year