Demonstrates iterative FGSM on Apple's NeuralHash model.
☆16Aug 19, 2021Updated 4 years ago
Alternatives and similar repositories for apple-neuralhash-attack
Users that are interested in apple-neuralhash-attack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Reference of Vehicle Security。☆12Aug 13, 2021Updated 4 years ago
- Subdomain finder☆10Mar 13, 2025Updated last year
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Apr 2, 2021Updated 5 years ago
- burpplugin 根据一遍神贴,实现了一下burp插件版本的小刀,一键生成shell☆14Jul 15, 2019Updated 6 years ago
- Attack & Defense CTF dashboard☆16Oct 7, 2021Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- jre8u20 gadget☆34May 23, 2021Updated 4 years ago
- Burp Suite Extension useful to inspect UPnP security☆16Nov 9, 2021Updated 4 years ago
- A wrapper for memory hacking related functions (WriteProcessMemory, ReadProcessMemory, etc) as well as a DLL injection function and patte…☆17May 29, 2020Updated 5 years ago
- PoC for CVE-2021-43557☆22Nov 22, 2021Updated 4 years ago
- Cobalt Strike < 4.4 dos CVE-2021-36798☆37Aug 19, 2021Updated 4 years ago
- Java XMLDecoder payload generator☆16Jul 27, 2021Updated 4 years ago
- QilingLab challenge writeup☆22Sep 25, 2021Updated 4 years ago
- CTF Challenge☆19Nov 20, 2020Updated 5 years ago
- Reverse shell without Windows cmd.exe, using ReactOS cmd.dll as shellcode☆23May 24, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A small PoC for the recent RCE found in the Goahead Webserver prior to version 5.1.5.☆22Oct 18, 2021Updated 4 years ago
- The repository accompanying the Buer Emulation workshop☆24Aug 18, 2021Updated 4 years ago
- ☆17Jan 27, 2022Updated 4 years ago
- 这资源是作者复现微软签字证书漏洞CVE-2020-0601,结合相关资源及文章实现。推荐大家结合作者博客,理解ECC算法、Windows验证机制,并尝试自己复现可执行文件签名证书和HTTPS劫持的例子。作为网络安全初学者,自己确实很菜,但希望坚持下去,加油!☆30Feb 17, 2020Updated 6 years ago
- Unauthorized Access to Metadata and User Data like CTF☆28Nov 30, 2024Updated last year
- Automate the process of an S3 bucket subdomain takeover via dangling CNAME record☆26May 20, 2024Updated last year
- Some CTF Write-ups☆27Feb 7, 2022Updated 4 years ago
- Run PowerShell command without invoking powershell.exe☆36Nov 22, 2021Updated 4 years ago
- Currently proof-of-concept☆17Dec 17, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Wireless Codec2 compressed audio transport over ESPNow using ESP32 micro controller.☆14Mar 29, 2025Updated last year
- A PE parser written in C++ which does not uses OOP. Helpful if you want to learn about PE parsing.☆18Apr 10, 2023Updated 3 years ago
- The swiss knife of Denon's Engine PRIME☆13Apr 30, 2025Updated last year
- Open Source HVS for geiger counters.☆11Jan 20, 2026Updated 3 months ago
- shw's CTF challenges☆27Apr 5, 2021Updated 5 years ago
- A repository for the 2019 AMS Radar Open Source Short Course in Nara Japan☆10Sep 12, 2019Updated 6 years ago
- ☆11Nov 17, 2024Updated last year
- ☆13Aug 25, 2021Updated 4 years ago
- Generate DOM clobbering attack vectors for you.☆35Jun 3, 2025Updated 11 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Simple GUI for unlocking cryptsetup volumes☆13Jul 15, 2018Updated 7 years ago
- Auto Move Your Cursor to the Focused Window while You Alt-Tab or Touchboard for Windows☆10Dec 11, 2024Updated last year
- Caddy module to throttle incoming connection bandwidth☆16Oct 14, 2025Updated 6 months ago
- Windows Etw LPE☆52Oct 12, 2021Updated 4 years ago
- ☆11Jan 14, 2018Updated 8 years ago
- By manipulating LSASS memory flags like UseLogonCredential and IsCredGuardEnabled, this repo demonstrates how Credential Guard can be byp…☆14May 25, 2025Updated 11 months ago
- Workspace for project waves - bringing DeFi to Liquid.☆16Mar 9, 2022Updated 4 years ago