Using Convnets and advanced Image Processing techniques to detect DeepFake videos.
☆12Aug 6, 2020Updated 5 years ago
Alternatives and similar repositories for DeepFake-Detection
Users that are interested in DeepFake-Detection are comparing it to the libraries listed below
Sorting:
- A cloud based remote android managment suite(Botnet), powered by NodeJS☆11Apr 27, 2021Updated 4 years ago
- Google hacking, also named Google dorking, is a hacker technique that uses Google Search and other Google applications to find security h…☆14May 8, 2021Updated 4 years ago
- ☆13Jul 13, 2020Updated 5 years ago
- Numerous fork bombs in popular programming langs ...☆10May 25, 2017Updated 8 years ago
- My modern disassemblies of paleolithic (DOS-era) malware!☆13Feb 7, 2026Updated 3 weeks ago
- ☆10Aug 9, 2024Updated last year
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- Bash & Python scripts for daily life☆16Nov 27, 2018Updated 7 years ago
- initial commit☆44Nov 19, 2024Updated last year
- This is a collection of Viruses and Worms for Malware Researchers it forms a good backbone from malware back in the day to some recent on…☆11Aug 26, 2014Updated 11 years ago
- This is a script that accesses subreddits and downloads media based on keywords from the submission title.☆13Mar 9, 2020Updated 5 years ago
- The implementation of sdhash, the algorithm to calculate similarity digests, rewritten in pure go language 🐹☆10Jan 17, 2021Updated 5 years ago
- Mass malicious script dump/Malware src dump☆16Nov 25, 2016Updated 9 years ago
- APK Static Analyzer☆10Dec 4, 2015Updated 10 years ago
- Known WannCrypt Bitcoin addresses☆10Jul 17, 2017Updated 8 years ago
- Bruteforce logins with python☆11Jul 12, 2022Updated 3 years ago
- Tools for hunting security threats☆12Feb 4, 2020Updated 6 years ago
- Malware samples observed in the wild from time to time☆12Jul 29, 2019Updated 6 years ago
- The Tool will fetch the article links for you, based on your query. Enter anything you want to search, whether a vulnerability descriptio…☆10Jan 2, 2021Updated 5 years ago
- pour plus de tutos veuillez visiter le site☆11Sep 21, 2020Updated 5 years ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Mar 26, 2021Updated 4 years ago
- cidrgen is based on cidr's subnet IP list generator☆15Aug 21, 2020Updated 5 years ago
- javascript botnet browser V3 based one Cloud 9 Botnet and my botnet browser chrome. capture any web site,virtual clavier ,paypal,facebook…☆10Sep 12, 2020Updated 5 years ago
- Retro programming in Borland Turbo Assembler☆15Dec 19, 2018Updated 7 years ago
- Windows Trollware and Persistence Script☆13Sep 16, 2015Updated 10 years ago
- Python botnet☆12Aug 15, 2015Updated 10 years ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆13May 10, 2020Updated 5 years ago
- Secure FTP☆11Jul 28, 2018Updated 7 years ago
- Dump of the crypto-miner that got installed on my system☆14May 30, 2020Updated 5 years ago
- 最近出現在影印店的病毒,會請大家幫忙挖礦 XD☆13Jun 20, 2016Updated 9 years ago
- Proof of concept created for 'Reflection Scan: an Off-Path Attack on TCP'.☆11Jan 20, 2012Updated 14 years ago
- Phishing detection regex for Blueteams☆12Dec 27, 2020Updated 5 years ago
- Linux/macOS random/vendor MAC-address changer.☆15Mar 20, 2022Updated 3 years ago
- PHP Vulnerability Hunter (fork)☆12May 8, 2015Updated 10 years ago
- Pollute phishing kits with fake credentials☆12Dec 17, 2021Updated 4 years ago
- Take a list of URIs and print all the of the paths☆10Aug 16, 2020Updated 5 years ago
- Misc IDA Pro scripts☆23Oct 17, 2016Updated 9 years ago
- Automatically Scans For Default Networks & Guess The Password☆14Dec 9, 2016Updated 9 years ago
- Scripts, tools and drivers for wardriving under Mac OSX☆14Dec 7, 2016Updated 9 years ago