greentfrapp / apple-neuralhash-attackLinks
Demonstrates iterative FGSM on Apple's NeuralHash model.
☆16Updated 4 years ago
Alternatives and similar repositories for apple-neuralhash-attack
Users that are interested in apple-neuralhash-attack are comparing it to the libraries listed below
Sorting:
- Pwnkit Exploit (CVE-2021-4034), no download capabilty? Copy and paste it!☆17Updated 3 years ago
- Network Traffic Fuzzer☆18Updated 10 months ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆16Updated 4 years ago
- Burp Suite Extension useful to inspect UPnP security☆16Updated 4 years ago
- Pickle decompiler plugin for Radare2☆18Updated 2 years ago
- ☆18Updated 2 years ago
- Tool for profiling heap usage and memory management☆27Updated 4 years ago
- CVE-2021-42008: Exploiting A 16-Year-Old Vulnerability In The Linux 6pack Driver☆31Updated 3 years ago
- Exactly what it sounds like, which is something rad☆22Updated 3 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- ☆24Updated 4 years ago
- ☆11Updated 4 years ago
- "A Practical Recipe for Hardware Implants" presentation materials.☆14Updated 4 years ago
- ☆12Updated last year
- A 2-in-1 toolset of https://github.com/x0rz/EQGRP_Lost_in_Translation and https://github.com/x0rz/EQGRP☆25Updated 6 years ago
- A Simple CVE-2022-39299 PoC exploit generator to bypass authentication in SAML SSO Integrations using vulnerable versions of passport-sam…☆18Updated 2 years ago
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps …☆24Updated 3 years ago
- Simple unpacking script for Ezuri ELF Crypter☆34Updated 4 years ago
- Like Russian roulette, but for your kernel.☆14Updated 3 months ago
- μετάμάσκα - malevolent payload classifier☆24Updated 2 years ago
- Configure SPI flash write protection.☆24Updated 5 years ago
- ☆26Updated 4 years ago
- Hybrid memory/disk map☆60Updated last month
- DC540 hacking challenge 0x00002 [MicroPython CTF].☆13Updated 2 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Updated 2 years ago
- Tool to perform differential fault analysis attack (DFA) on whiteboxes with external encodings.☆16Updated 2 years ago
- NAT Slipstream attack code samples☆48Updated 4 years ago
- Go (golang) client library for the Dropbox core and Datastore API with support for uploading and downloading encrypted files.☆12Updated 8 years ago
- ☆21Updated last year
- RustHunter is a modular incident response framework based on Rust and Ansible to build and compare environmental baselines.☆18Updated 3 years ago