Scott Freitas's starred repositories
stable-diffusion
A latent text-to-image diffusion model
Real-ESRGAN
Real-ESRGAN aims at developing Practical Algorithms for General Image/Video Restoration.
MalwareSourceCode
Collection of malware source code for a variety of platforms in an array of different programming languages.
stable-diffusion-videos
Create 🔥 videos with Stable Diffusion by exploring the latent space and morphing between text prompts
category_encoders
A library of sklearn compatible categorical variable encoders
graph-fraud-detection-papers
A curated list of graph-based fraud, anomaly, and outlier detection papers & resources
DeepRobust
A pytorch adversarial library for attack and defense methods on images and graphs
depthai-experiments
Experimental projects we've done with DepthAI.
Knowledge-Graph-Tutorials-and-Papers
Insightful Tutorials and Papers about Knowledge Graphs
Python-Ransomware
Python Ransomware Tutorial - YouTube tutorial explaining code + showcasing the ransomware with victim/target roles
pyhtools
A Python Hacking Library consisting of network scanner, arp spoofer and detector, dns spoofer, code injector, packet sniffer, network jammer, email sender, downloader, wireless password harvester credential harvester, keylogger, download&execute, ransomware, data harvestors, etc.
gnn-comparison
Official Repository of "A Fair Comparison of Graph Neural Networks for Graph Classification", ICLR 2020
JPGtoMalware
It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography methods. For this reason, it does not cause any distortion in the JPG file. The JPG file size and payload do not have to be proportional.The JPG file is displayed normally in any viewing application or web application. It can bypass various security programs such as firewall, antivirus. If the file is examined in detail, it is easier to detect than steganography methods. However, since the payload in the JPG file is encrypted, it cannot be easily decrypted. It also uses the "garbage code insertion/dead-code insertion" method to prevent the payload from being caught by the antivirus at runtime.
awesome-graph-attack-papers
Adversarial attacks and defenses on Graph Neural Networks.
Email-Bomber
Spam emails
Python-Ransomware
Complete Python RansomeWare Source Code With Full Decoumetions.
RAT-Collection
Remote Access Trojan collection.(260+ RAT-Builders!)
BTC-Clipper
Bitcoin Clipper malware made in Python
malware-techniques
A collection of techniques commonly used in malware to accomplish core tasks.