32 skills found · Page 2 of 2
HoffmannAlex / Hack Instagram Account With AIAI-powered Instagram security hacking tool that uses machine learning to intelligently guess passwords. Features pattern recognition, neural networks, and context-aware generation. For authorized educational security testing only. Demonstrates real hacking techniques.
AyushParkara / WhisperNetAn intelligent, interactive wordlist generator built for targeted password profiling. Ideal for red teams, OSINT, and ethical hacking — powered by custom patterns, leetspeak, and contextual logic.
kevinl05 / PromptmenotDetect and sanitize prompt injection attacks in Rails apps. Protects against direct injection (users hacking your LLMs via form inputs) and indirect injection (malicious prompts stored for other LLMs to scrape). ~70 detection patterns across 7 attack categories with configurable sensitivity levels. Now includes resource extraction detection pattern
Iankulani / You Can Crack ItYou-Can-Crack-It is a next-generation cyber-security training tool designed to inspire upcoming ethical hackers. The system simulates brute-force attempts on port 22 (SSH) in a controlled, legal, and virtual environment, helping learners understand password-strength principles, attack patterns, and defensive countermeasures.
sajeevan16 / DDoS Testing ServerAPIs are exposed to the public or internal network interfaces, thus they are vulnerable to various security threats. Hackers can attack such APIs to steal sensitive data or to disrupt the services provided by APIs to the intended users. Therefore, API-based attack detection is important to identify and prevent fraudulent access to APIs. Since Machine learning (ML) and Artificial Intelligence (AI) have shown great potential in detecting abnormal patterns, AI is a useful tool in detecting attacks to the APIs. However, using AI/ML requires accurate data to learn the fraudulence patterns and to validate the developed solutions, which is a major challenge faced by data scientists and researchers. To address this challenge, we proposed an approach that learns to detect attacks using the generated data by attacking the APIs. Therefore, the solution will consist of two models for 1) attack detection, 2) attack generation. Assume if we want to detect DDOS attacks, the attack simulation model will try to simulate the DDOS attack without being detected by the attack detection model. If the attack is undetected and leads to the unavailability of the API, we can assign a penalty to attack detection model, and reward to the attacking model. We can allow both models to compete with each other similar to adversarial learning to achieve highly accurate attack detection models. This blogs [1] explains how adversarial learning is used to prevent attacks to the image recognition models. The goal of this project is to deliver an attack simulation and detection tool by improving adversarial learning approaches to simulate and detect API-based attacks.
LeadingIndiaAI / Face Recognition Technique In Bank Locker Systems For Security Purpose Using Deep Learning Face Recognition is turning into another pattern in the security validation frameworks. Present day FR frameworks can even identify, if the individual is real (live) or not, while doing face acknowledgment, keeping the frameworks being hacked by demonstrating the photo of a genuine individual. I am certain, everybody pondered when Facebook executed the auto-labeling method. It recognizes the individual and label him/her at whatever point you transfer a photo. It is efficient to the point that, notwithstanding when the individual's face is blocked or the photo is taken in obscurity, it labels precisely. All these effective face acknowledgment frameworks are the after effects of ongoing progressions in the field of PC vision, which is upheld by intense profound learning calculations. In the present current world, security assumes an imperative part. For that reason, we proposed propel security frameworks for saving money locker framework and the bank clients. This specific security is proposed through two unique modules in mix i.e. confront identification procedure and password verification. All these means are followed in the grouping on the off chance, that if anything turns out badly he or she can't get to the framework. Presently clients don't need to stress over the illicit access to their locker frameworks. These propelled procedures in this day and age influence individuals to feel anchor. This likewise prompts aversion of burglary. We have developed a Web Application to showcase our project. It has been observed by comparing all the models that CNN provides high accuracy (98.3%).
yivo / Publisher Subscriber⚡️ Lightning fast Publisher-Subscriber pattern written in CoffeeScript using V8 hacks. Backbone.Events compatible.
JoanStinson / HackAndSlashA simple hack and slash game using SDL and C++ with some design patterns and doxygen documentation.
Rajdeepkaur96 / WHAT IS TECHNOLOGICAL ADVANCEMENT HOW ADVANCED IS TECHNOLOGY ATTACHED TO THE MAN PROBLEM MAN PROBLEM? Technology advancement to address the world’s rising demand for clean and reasonable power will need simultaneous improvements in materials science and technology in order to meet the achievement demands of new power-generating systems. For instance, a technological advance in the wireless broadband industry might enable more productive use of insufficient range, resulting in greater speed and capability for wireless broadband There are so numerous methods technological advancements have improved humanity, save time and cost of production. Our individual life is now massively dependent on technology and technology has advanced with years and transformed the way we practice, travel, socialize, educate our children live, and buy products. As somebody’s demands for developing technology recommence, the Institute of Electrical and Electronics Engineers (IEEE’s) presents a clear knowledge as an industry ready to continue developing patterns for the computer and science industry that foster technological discovery and perfection for the benefit of humanity. Advancing technology for the advantage of humanity Technology transforms the way individuals talk, learn, and imagine. It helps the community and ascertains show people cooperate with each other on a periodic basis. Technology plays a vital role in society. The invention of the internet supplies us access to data at a twenty-four-hour rate and you have access to almost anything online. technological advancements initiated learning more entertainment and beneficial. Technology brought many new modes of electronic intelligence. For example, there is social networking, emails. you can facetime a personality that lives on the other side of the globe, and there’s video conferencing where you can have discussions electronically. There are many innovative apps on telephones that although characters to watch their weight, how many calories they intake, their heart rate and other health resources any time of the day. technology provides us with a lot of educational content, fast and free, which makes the learning process more personalized and self-paced, improving it. technology has made life easier mostly for those who get the chance to interact with it. For instance use of social media or websites in our daily lives. young people who become addicted to social media ( media platforms such as TikTok, Instagram, Twitter, Facebook, Snapchat and others are highly addictive, and YouTube can also be grouped into this category. Every time a person takes engagement via a “comment” “follow” or “like” somebody’s brain delivers feel-good neurotransmitters, eventually resulting in wanting more engagement). they crave to cope with the dynamic society where outward appearance is highly regarded. They do all kinds of things in order to become successful and get more likes some even grow cyberbullied because of their visions. This is why modern people suffer more from grief to the point of suicide. HOW ADVANCED TECHNOLOGY HAS ADDED THE MAN’S PROBLEM? Humans are the most magnificent piece of God. Nature has given humans all the demanded things that they required. But the eagerness of humans was not fulfilled. They started making technology in order to get their work done more spontaneously. There are so many interests in Technology. But remember if there is a benefit, there problem also. So the obstacle is people became inactive because of technology. Nowadays, we do not go to the supermarket to purchase groceries rather than order them online. We didn’t go out and meet our associates “face to face” alternatively that we meet them on social media “ONLINE” or “LIVE”. The human mind has built technology but now technology is destroying our minds. Technology has also created some new complications for humans. We don’t believe in our own people instead we consider technology which can be replaced by itself also. Nowadays, there are several Hackers on the Internet. They can take your secret data also. Conclusion. we are in the epoch of globalization, where technologies will always be done, and these have designed a great change in human action, either for good or for bad. Technology has promoted many things, and entering in context has served much, in distance education; however, technology can become serious because sometimes it can create problems for the man if it is not used suitably, following rules of their use.
NickJordan289 / NoPixel Hacking Device BotPattern recognition to locate character sequence for solving nopixel hacking device minigame
KylChiang / CoordinatorTestThis is the full code practice by tutorial - "How to use the coordinator pattern in iOS apps", Paul Hudson, Hacking with Swift. You can see more here ( https://www.hackingwithswift.com/articles/71/how-to-use-the-coordinator-pattern-in-ios-apps )
ebenhaezer19 / WIFROG V1.0.0WIFROG is an ethical hacking tool designed for cybersecurity enthusiasts. It employs brute force techniques to test Wi-Fi network security by systematically recovering passwords. Key features include customizable password patterns, length range specification, real-time progress tracking, and a simulation mode for safe learning. WIFROG promotes ethi