92 skills found · Page 1 of 4
0xKayala / NucleiFuzzerNucleiFuzzer is a robust automation tool that efficiently detects web application vulnerabilities, including XSS, SQLi, SSRF, and Open Redirects, leveraging advanced scanning and URL enumeration techniques
screetsec / DracnmapDracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes with lots of options that can make the utility more robust and difficult to follow for new users. Hence Dracnmap is designed to perform fast scaning with the utilizing script engine of nmap and nmap can perform various automatic scanning techniques with the advanced commands.
JLospinoso / GargoyleA memory scanning evasion technique
aaaddress1 / SkrullSkrull is a malware DRM, that prevents Automatic Sample Submission by AV/EDR and Signature Scanning from Kernel. It generates launchers that can run malware on the victim using the Process Ghosting technique. Also, launchers are totally anti-copy and naturally broken when got submitted.
samhaxr / HackboxHackBox is a powerful and comprehensive tool that combines a variety of techniques for web application and network security assessments, including XSS testing, subdomain scanning, SSRF injection, and more. Its user-friendly interface and wide range of features make it a valuable asset for security professionals.
Gentle-bae / UploadRangerProfessional file upload vulnerability testing tool with 263+ bypass techniques, proxy capture, dynamic scanning(专业的文件上传漏洞检测工具,支持263+绕过技术、代理抓包、动态扫描)
JanielDary / ELFieScannerA C++ tool for process memory scanning & suspicious telemetry generation that attempts to detect a number of malicious techniques used by threat actors & those which have been incorporated into open-source user-mode rootkits.
adulau / Active Scanning TechniquesA compilation of network scanning strategies to find vulnerable devices
hasibzunair / Uniformizing 3D[MICCAI'2020 PRIME] Uniformizing Techniques to Process CT scans with 3D CNNs for Tuberculosis Severity Estimation.
DeepHiveMind / Medical Healthcare 3D Imaging AI:hospital: :eye_speech_bubble: Medical Healthcare AI | Robotic Surgery | Automated Brain Tumour Segmentation | Skin Cancer Lesion Detection & Segmentation (Melonama Recognition) | Lung Cancer detection (Chest CT Scan) | IMAGE SEGMENTATION TECHNIQUES
Alikhalkhali / Active Ip🕵️♂️🔍 A tool with several scanning techniques that extracts live IP addresses from a list of IP addresses or CIDR notations.
WithSecureLabs / Dotnet GargoyleA spiritual .NET equivalent to the Gargoyle memory scanning evasion technique
Shauqi / Attack And Anomaly Detection In IoT Sensors In IoT Sites Using Machine Learning ApproachesAttack and Anomaly detection in the Internet of Things (IoT) infrastructure is a rising concern in the domain of IoT. With the increased use of IoT infrastructure in every domain, threats and attacks in these infrastructures are also growing commensurately. Denial of Service, Data Type Probing, Malicious Control, Malicious Operation, Scan, Spying and Wrong Setup are such attacks and anomalies which can cause an IoT system failure. In this paper, performances of several machine learning models have been compared to predict attacks and anomalies on the IoT systems accurately. The machine learning (ML) algorithms that have been used here are Logistic Regression (LR), Support Vector Machine (SVM), Decision Tree (DT), Random Forest (RF), and Artificial Neural Network (ANN). The evaluation metrics used in the comparison of performance are accuracy, precision, recall, f1 score, and area under the Receiver Operating Characteristic Curve. The system obtained 99.4% test accuracy for Decision Tree, Random Forest, and ANN. Though these techniques have the same accuracy, other metrics prove that Random Forest performs comparatively better.
resurrecting-open-source-projects / DnsmapScan for subdomains using bruteforcing techniques
GameTechDev / FaceMappingThe face mapping sample uses the 3D Scan module to scan the user's face and then map it onto an existing 3D head model. This technique does a "stone face" mapping that is not rigged or currently capable of animating.
HuysmanWang / Deep Learning Aided Porous Media Hydrodynamic Analysis And Three Dimensional ReconstructionThe study of hydrodynamic behavior and water-rock interaction mechanisms is typically characterized by high computational efficiency requirements, to allow for the fast and accurate extraction of structural information. Therefore, we chose to use deep learning models to achieve these requirements. In this paper we started by comparing the image segmentation performance of a series of autoencoder architectures on complex geometries of porous media. The goal was to extract hydrodynamic connectivity channels and the mineral composition of rock samples on SEM (Scanning electron microscopy) data, obtained with a 0.97 accuracy. We then focused on improving the computational efficiency of LBM by using GPU acceleration, which allowed us to rapidly simulate structural flow field features of complex porous media. The results obtained showed that we were able to improve the computational efficiency by a factor of 21 in our device environment. We subsequently employed a SWD-Cycle-GAN technique to migrate sedimentation features to the initial 2D structure slices to reconstruct a 3D (three-dimensional) porous media geometry, that fits the depositional features more closely. Overall, we propose a new method for 3D structure reconstruction and permeability performance analysis of porous media, based on deep learning. The proposed method is fast, efficient and accurate.
Baskar-forever / TableExtractor Advanced PDF Table ExtractionPDF Table Extractor is an innovative Python project designed to tackle the challenge of extracting tables from scanned PDF documents. Leveraging advanced optical character recognition (OCR) and image processing techniques.
YD-Qi / Crypto ScannerA web app to scan crypto markets based on candlestick pattern recognition from "Japanese Candlestick Charting Techniques: A Contemporary Guide to the Ancient Investment Techniques of the Far East"
shivamBasak / Brain Stroke DetectionThis project involves developing a system to detect brain strokes from medical images, such as CT or MRI scans. The system uses image processing and machine learning techniques to identify and classify stroke regions within the brain, aiming to provide early diagnosis and assist medical professionals in treatment planning.
girishsg24 / Moving Target Defense RHM Using SDNDeveloped a Moving Target Defense mechanism to prevent IP scanning from inside & outside the network. Controlled the packet flow in a SDN based on Random host mutation technique. Developed the a new routing mechanism using north bound API provided by controller using multithreading, decorators, event creation & event handling techniques. Performed extensive testing and evaluation on OpenFlow protocol & RYU controller using python