odamODAM - Object detection and Monitoring
Stars: ✭ 16 (-60%)
volana🌒 Shell command obfuscation to avoid detection systems
Stars: ✭ 38 (-5%)
netdisco🔎 Python library to scan local network for services and devices.
Stars: ✭ 252 (+530%)
DDTTXDDTTX Tabletop Trainings
Stars: ✭ 22 (-45%)
MDNS GenericmDNS Library for nRF52, SAMD21, SAMD51, SAM DUE, STM32F/L/H/G/WB/MP1, AVR Mega, RP2040-based boards, etc. using Ethernet W5x00. Supports mDNS (Registering Services) and DNS-SD (Service Discovery). Ethernet_Generic library is used as default for W5x00
Stars: ✭ 22 (-45%)
giggerGit folder digger, I'm sure it's worthwhile stuff.
Stars: ✭ 39 (-2.5%)
termux-snippetsAn integrated tool and a collection of snippets which helps in the various aspects of the terminal.
Stars: ✭ 28 (-30%)
seahorseELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)
Stars: ✭ 31 (-22.5%)
UBAUEBA Solution for Insider Security. This repo is archived. Thanks!
Stars: ✭ 36 (-10%)
pyetiPython bindings for Yeti's API
Stars: ✭ 15 (-62.5%)
shinTBTextboxes : Image Text Detection Model : python package (tensorflow)
Stars: ✭ 90 (+125%)
oscp-omnibusA collection of resources I'm using while working toward the OSCP
Stars: ✭ 46 (+15%)
cflow-adOfficial PyTorch code for WACV 2022 paper "CFLOW-AD: Real-Time Unsupervised Anomaly Detection with Localization via Conditional Normalizing Flows"
Stars: ✭ 138 (+245%)
Comet.BoxCollection of Object Detection and Segmentation Pipelines🛸🚀
Stars: ✭ 24 (-40%)
AXI PCB defect detectionThis repo contains data pre-processing, classification and defect detection methodologies for images from Advance XRay Inspection from multi-layer PCB boards. Proprietary AXI image dataset is not included in this repo. Users can use their own datasets on top of the OOP data extraction layer and neural network models implemented here.
Stars: ✭ 31 (-22.5%)
Mask-YOLOInspired from Mask R-CNN to build a multi-task learning, two-branch architecture: one branch based on YOLOv2 for object detection, the other branch for instance segmentation. Simply tested on Rice and Shapes. MobileNet supported.
Stars: ✭ 100 (+150%)
MimirOSINT Threat Intel Interface - CLI for HoneyDB
Stars: ✭ 104 (+160%)
1earnffffffff0x 团队维护的安全知识框架,内容包括不仅限于 web安全、工控安全、取证、应急、蓝队设施部署、后渗透、Linux安全、各类靶机writup
Stars: ✭ 3,715 (+9187.5%)
VirusX5The Most Powerful Fake Page Redirecting tool...
Stars: ✭ 15 (-62.5%)
haiti🔑 Hash type identifier (CLI & lib)
Stars: ✭ 287 (+617.5%)
mdnsdJeremie Miller's original mdnsd
Stars: ✭ 43 (+7.5%)
mitmA simple yet effective python3 script to perform DNS spoofing via ARP poisoning
Stars: ✭ 23 (-42.5%)
adalancheActive Directory ACL Visualizer and Explorer - who's really Domain Admin?
Stars: ✭ 862 (+2055%)
Python-KeyloggerPython Tutorial - || Advanced Keylogger || Code Walk-through || Hacking/Info-Sec ||
Stars: ✭ 55 (+37.5%)
volkscvA Python toolbox for computer vision research and project
Stars: ✭ 58 (+45%)
AstraAstra is a tool to find URLs and secrets inside a webpage/files
Stars: ✭ 187 (+367.5%)
mmrazorOpenMMLab Model Compression Toolbox and Benchmark.
Stars: ✭ 644 (+1510%)
dystopiaLow to medium multithreaded Ubuntu Core honeypot coded in Python.
Stars: ✭ 59 (+47.5%)
detectionDetection in the form of Yara, Snort and ClamAV signatures.
Stars: ✭ 70 (+75%)
detect-featuresDetect and report browser and hardware features.
Stars: ✭ 63 (+57.5%)
TiEtwAgentPoC memory injection detection agent based on ETW, for offensive and defensive research purposes
Stars: ✭ 135 (+237.5%)
NetServiceSwift NetService (Bonjour / Zeroconf / mDNS) implementation for Linux
Stars: ✭ 103 (+157.5%)
ExploitsA personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in conjunction with these exploits.
Stars: ✭ 75 (+87.5%)
goverviewgoverview - Get an overview of the list of URLs
Stars: ✭ 93 (+132.5%)
radialeWhat if home automation was homoiconic? Just transformations of data? No more YAML!
Stars: ✭ 21 (-47.5%)
arpA go package to monitor ARP changes and notify when mac is online or offline. Also allow forced IP address change (IP spoofing).
Stars: ✭ 33 (-17.5%)
FCOS.Pytorchfcos implementation in pytorch1.x
Stars: ✭ 84 (+110%)
AutomataAutomatic detection engineering technical state compliance
Stars: ✭ 33 (-17.5%)
face-mask-detection-tf2A face mask detection using ssd with simplified Mobilenet and RFB or Pelee in Tensorflow 2.1. Training on your own dataset. Can be converted to kmodel and run on the edge device of k210
Stars: ✭ 72 (+80%)
challengesSecurity challenges and CTFs created by the Penultimate team.
Stars: ✭ 13 (-67.5%)
doraFind exposed API keys based on RegEx and get exploitation methods for some of keys that are found
Stars: ✭ 229 (+472.5%)
elmocutEye candy ARP spoofer for Windows
Stars: ✭ 85 (+112.5%)
RaspberryPi-4WD-CarYahboom 4WD smart robot with AI vision features for Raspberry Pi 4B
Stars: ✭ 31 (-22.5%)
opencv TLDTLD:tracking-learning-detection 跟踪算法
Stars: ✭ 41 (+2.5%)
maalikFeature-rich Post Exploitation Framework with Network Pivoting capabilities.
Stars: ✭ 75 (+87.5%)
aa-policy-validatorValidate all your Customer IAM Policies against AWS Access Analyzer - Policy Validation
Stars: ✭ 42 (+5%)