sensity-ai / dot
The Deepfake Offensive Toolkit
☆4,252Updated 8 months ago
Alternatives and similar repositories for dot:
Users that are interested in dot are comparing it to the libraries listed below
- A curated list of useful resources that cover Offensive AI.☆1,169Updated 2 weeks ago
- An open-source digital image forensic toolset☆2,753Updated 3 months ago
- A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Boun…☆8,314Updated last week
- Panthera(P.)uncia - Official CLI utility for Osprey Vision, Subdomain Center & Exploit Observer.☆643Updated last month
- Web Attack Cheat Sheet☆4,231Updated last week
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!☆2,078Updated 3 months ago
- Extract files from any kind of container formats☆2,275Updated this week
- GitHub Data Analysis Framework.☆1,833Updated 8 months ago
- A collaboratively curated list of awesome Open-Source Intelligence (OSINT) Resources☆2,044Updated last month
- apk.sh makes reverse engineering Android apps easier, automating some repetitive tasks like pulling, decoding, rebuilding and patching an…☆3,405Updated 6 months ago
- KeyDecoder app lets you use your smartphone or tablet to decode your mechanical keys in seconds.☆3,099Updated last year
- Real-time face swap for PC streaming or video calls☆27,639Updated 3 months ago
- 🐸 Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell …☆6,785Updated last year
- A collection of several hundred online tools for OSINT☆5,847Updated 6 months ago
- A Pluggable Authentication Module (PAM) which allows the establishment of alternate passwords that can be used to perform actions to clea…☆1,345Updated 4 months ago
- min(DALL·E) is a fast, minimal port of DALL·E Mini to PyTorch☆3,484Updated 2 years ago
- OSINT from your favorite services in a friendly terminal user interface - integrations for Virustotal, Shodan, and Censys☆1,008Updated 4 months ago
- Successor of Avatarify Python☆1,189Updated 10 months ago
- Hundreds of Offensive and Useful Docker Images for Network Intrusion. The name says it all.☆1,225Updated last year
- A GPT-empowered penetration testing tool☆7,790Updated 3 months ago
- GooFuzz is a tool to perform fuzzing with an OSINT approach, managing to enumerate directories, files, subdomains or parameters without l…☆1,404Updated 9 months ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆2,937Updated last month
- An HTTP toolkit for security research.☆6,198Updated 2 weeks ago
- magic-trace collects and displays high-resolution traces of what a process is doing☆4,794Updated 3 months ago
- Wi-Fi Exploitation Framework☆2,479Updated 5 months ago
- Offensive Software Exploitation Course☆2,352Updated last year
- This is a repository of resource about Malware techniques☆779Updated last year
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,381Updated 2 years ago
- Collection of malware source code for a variety of platforms in an array of different programming languages.☆16,485Updated 2 months ago
- Tools and Techniques for Red Team / Penetration Testing☆6,306Updated last year