Most Powerful Send Fake Mail Using Any Mail I'd undetectable
- Updated
Jun 22, 2022 - Python
Most Powerful Send Fake Mail Using Any Mail I'd undetectable
Face detection and recognition + liveness detection and spoofing attack recognition using onnxruntime. Includes an easy-to-use Flask API and Dockerfile.
🚨 Check the asn is able to use for ip header modification or no
University of Edinbrugh-Johns Hopkins University's system for ASVspoof 2017 Version 2.0 dataset.
Baselines and Classifiers for speaker anti-spoofing detection
Deep learning-based audio spoofing attack detection experiments for speaker verification.
ARP Poisoning/Spoofing using Scapy Python Library
Implementation of the dns cache poisoning attack reloaded (ACM CCS '20) replication.
Cyber-attack that uses DNS Recursive Server in order to perform a Reflection Attack.
Modbus Attack Tool for Remote Industrial eXploitation (M.A.T.R.I.X) is a comprehensive security testing tool for Modbus TCP protocol implementations.
📡 Automatic Driving LiDAR Spoofing Forensics Datasets
A Python-based ARP spoofing tool for performing Man-In-The-Middle (MITM) attacks by sending spoofed ARP packets to the victim and router.
dns spoofing tool, with regex support, target specification and more...
DNS Spoofing Tool simulates TuDoor attacks by crafting and sending malicious DNS responses to exploit vulnerabilities in DNS resolution, allowing users to test and evaluate DNS security measures.
This project detects whether a face is real or fake using deep learning and computer vision. It uses CNN models trained on depth maps to check liveness in real-time. By combining eye movement tracking and voice recognition, the system ensures secure authentication and prevents spoofing attacks.
Automatic CSP Report-URI report spoofing tools
FeatherNets: Anti Spoof Attack Detection Model (in-progress)
Network Traffic analysis is a crucial aspect of network security and network management, enabling the monitoring, inspection, and interpretation of data packets flowing across a network.
Add a description, image, and links to the spoofing-attack topic page so that developers can more easily learn about it.
To associate your repository with the spoofing-attack topic, visit your repo's landing page and select "manage topics."