Extracts faces from youtube videos
☆18Nov 7, 2023Updated 2 years ago
Alternatives and similar repositories for extractfacesfromyoutube
Users that are interested in extractfacesfromyoutube are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Random OSINT idea tool thing☆24Jan 11, 2026Updated 2 months ago
- Quick commands for pentesting/No typing!☆18Nov 21, 2023Updated 2 years ago
- Profile layout☆15Sep 11, 2025Updated 6 months ago
- Seamless mode integration for WSL☆11Dec 29, 2023Updated 2 years ago
- Analyze your tryhackme progress!☆12May 27, 2024Updated last year
- Bookmarklet to find endpoints easily with one click☆79May 19, 2024Updated last year
- Remake of CVE-2020-9484 by Pentestical☆24Sep 16, 2024Updated last year
- Turning smart lights into Wifi Hacking implants.☆190Feb 10, 2025Updated last year
- C++ Assembler with Built-in Mutation Engine☆30Sep 6, 2025Updated 6 months ago
- Decompilation research of Banjo-Kazooie for the xbox 360☆17Mar 7, 2026Updated 2 weeks ago
- Toolkit for Active Directory security assessments.☆10Jun 4, 2024Updated last year
- ESP8266 Captive Portal with Google login page☆23Nov 28, 2023Updated 2 years ago
- CVE-2024-2879 - LayerSlider 7.9.11 - 7.10.0 - Unauthenticated SQL Injection☆23Apr 8, 2024Updated last year
- Pattern recognition for hosts, services, and content☆14Aug 19, 2022Updated 3 years ago
- 🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard…☆1,806Feb 11, 2026Updated last month
- ☆10Jul 3, 2021Updated 4 years ago
- Persistence techniques for windows.☆19Jun 26, 2023Updated 2 years ago
- Fuzzing All Native Android System Services with Interface Awareness and Coverage☆37Sep 8, 2025Updated 6 months ago
- Statistics for telegram groups☆24Jan 26, 2021Updated 5 years ago
- My Kali Baseline Installer☆26Apr 2, 2020Updated 5 years ago
- Discover Non-Discoverable Bluetooth Classic devices☆13Oct 10, 2024Updated last year
- a custom 7z, which can use three keys instead of password to extract zip file.☆13Oct 5, 2018Updated 7 years ago
- Collection of useful Ghidra utilities and references☆14Apr 9, 2024Updated last year
- A curated blocklist of Autonomous System Numbers (ASNs) associated with VPN providers, datacenters, and hosting services commonly used fo…☆15Mar 11, 2026Updated last week
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆59Apr 18, 2021Updated 4 years ago
- Tools used to extract Flash memory from locked MPC5566 (Hardwear.io 2025 talk)☆20May 30, 2025Updated 9 months ago
- ☆13Apr 14, 2024Updated last year
- NekRos is an Open-Source Ransomeware, with advanced Features, Which Looks Like Wannacry and Has C&C Server which can be Used to Retrive K…☆13Jan 10, 2021Updated 5 years ago
- My attempt at making an obsidian theme☆25Jan 14, 2026Updated 2 months ago
- checks various security features of a system, including firewall, intrusion detection system (IDS),Intrusion Prevention Systems (IPS), Ne…☆11Feb 21, 2023Updated 3 years ago
- WPA Attack - Easy breaking WPA WPA2 networks by typing one command☆21Jun 15, 2015Updated 10 years ago
- IP Tracking☆10Jul 1, 2019Updated 6 years ago
- Private keys that have become public ...☆21Jun 8, 2022Updated 3 years ago
- Official payload library for the O.MG line of products from Mischief Gadgets☆10Aug 22, 2023Updated 2 years ago
- Password list generator in node js☆10May 8, 2024Updated last year
- Analysis and Creation of Wordlists with Complex Passwords for Password Cracking☆10Feb 23, 2026Updated last month
- Xfinity / Comcast Wordlist Generator☆78Mar 24, 2023Updated 3 years ago
- ☆28Sep 16, 2020Updated 5 years ago
- Projeto App Dieta + IA (Backend)☆10Sep 16, 2024Updated last year