Most Powerful Send Fake Mail Using Any Mail I'd undetectable
-
Updated
Jun 22, 2022 - Python
Most Powerful Send Fake Mail Using Any Mail I'd undetectable
Face detection and recognition + liveness detection and spoofing attack recognition using onnxruntime. Includes an easy-to-use Flask API and Dockerfile.
University of Edinbrugh-Johns Hopkins University's system for ASVspoof 2017 Version 2.0 dataset.
🚨 Check the asn is able to use for ip header modification or no
Baselines and Classifiers for speaker anti-spoofing detection
Deep learning-based audio spoofing attack detection experiments for speaker verification.
ARP Poisoning/Spoofing using Scapy Python Library
Implementation of the dns cache poisoning attack reloaded (ACM CCS '20) replication.
Cyber-attack that uses DNS Recursive Server in order to perform a Reflection Attack.
Modbus Attack Tool for Remote Industrial eXploitation (M.A.T.R.I.X) is a comprehensive security testing tool for Modbus TCP protocol implementations.
📡 Automatic Driving LiDAR Spoofing Forensics Datasets
A Python-based ARP spoofing tool for performing Man-In-The-Middle (MITM) attacks by sending spoofed ARP packets to the victim and router.
dns spoofing tool, with regex support, target specification and more...
DNS Spoofing Tool simulates TuDoor attacks by crafting and sending malicious DNS responses to exploit vulnerabilities in DNS resolution, allowing users to test and evaluate DNS security measures.
Automatic CSP Report-URI report spoofing tools
FeatherNets: Anti Spoof Attack Detection Model (in-progress)
Network Traffic analysis is a crucial aspect of network security and network management, enabling the monitoring, inspection, and interpretation of data packets flowing across a network.
Add a description, image, and links to the spoofing-attack topic page so that developers can more easily learn about it.
To associate your repository with the spoofing-attack topic, visit your repo's landing page and select "manage topics."