Bash script to check if a domain or list of domains can be spoofed based in DMARC records
-
Updated
Mar 6, 2022 - Shell
Bash script to check if a domain or list of domains can be spoofed based in DMARC records
3D Passive Face Liveness Detection (Anti-Spoofing) & Deepfake detection. A single image is needed to compute liveness score. 99,67% accuracy on our dataset and perfect scores on multiple public datasets (NUAA, CASIA FASD, MSU...).
OTP BOT Bypass SMS verifications from Paypal, Instagram, Snapchat, Google, 3D Secure, and many others...
JHU's system submission to the ASVspoof 2019 Challenge: Anti-Spoofing with Squeeze-Excitation and Residual neTworks (ASSERT).
University of Edinbrugh-Johns Hopkins University's system for ASVspoof 2017 Version 2.0 dataset.
Most Powerful Send Fake Mail Using Any Mail I'd undetectable
Face detection and recognition + liveness detection and spoofing attack recognition using onnxruntime. Includes an easy-to-use Flask API and Dockerfile.
A Email-Spoofer demo, via which a attacker may use this social-engineering skills to retrieve sensitive data from the victim just by manipulating Email-headers.
Baselines and Classifiers for speaker anti-spoofing detection
Implementation of the dns cache poisoning attack reloaded (ACM CCS '20) replication.
Detecting Homoglyph Attacks with CNN model using Computer Vision method
LETS BUILD YOU AN OTPBYPASS BOT
An Windows ARP & NDP Spoofing-Tool created with SharpPcap & PacketDotNet and C#
Bio-WISE: Biometric recognition with integrated pad: simulation environment
In this repositiories you will get some intresting this but this should be use for fun or kidding. This method should not be performed at school , college , or any other public place.
Zillion Utility purpose Neural authentication Interface: ZUNI
WiFi Evil Twin Attack - Credential Harvest Tool
Cyber security intro project covering SQL-injection, XSS, password hacking, etc.
Deep learning-based audio spoofing attack detection experiments for speaker verification.
Add a description, image, and links to the spoofing-attack topic page so that developers can more easily learn about it.
To associate your repository with the spoofing-attack topic, visit your repo's landing page and select "manage topics."