Scott Freitas's starred repositories

stable-diffusion

A latent text-to-image diffusion model

Language:Jupyter NotebookLicense:NOASSERTIONStargazers:67004Issues:556Issues:707

Real-ESRGAN

Real-ESRGAN aims at developing Practical Algorithms for General Image/Video Restoration.

Language:PythonLicense:BSD-3-ClauseStargazers:27259Issues:231Issues:658

MalwareSourceCode

Collection of malware source code for a variety of platforms in an array of different programming languages.

stable-diffusion-videos

Create 🔥 videos with Stable Diffusion by exploring the latent space and morphing between text prompts

Language:PythonLicense:Apache-2.0Stargazers:4376Issues:55Issues:122

category_encoders

A library of sklearn compatible categorical variable encoders

Language:PythonLicense:BSD-3-ClauseStargazers:2391Issues:38Issues:289

graph-fraud-detection-papers

A curated list of graph-based fraud, anomaly, and outlier detection papers & resources

pygod

A Python Library for Graph Outlier Detection (Anomaly Detection)

Language:PythonLicense:BSD-2-ClauseStargazers:1282Issues:16Issues:59

graphvite

GraphVite: A General and High-performance Graph Embedding System

Language:C++License:Apache-2.0Stargazers:1207Issues:32Issues:112

DeepRobust

A pytorch adversarial library for attack and defense methods on images and graphs

Language:PythonLicense:MITStargazers:965Issues:16Issues:105

depthai-experiments

Experimental projects we've done with DepthAI.

Language:Jupyter NotebookLicense:MITStargazers:804Issues:52Issues:177

Knowledge-Graph-Tutorials-and-Papers

Insightful Tutorials and Papers about Knowledge Graphs

DGFraud

A Deep Graph-based Toolbox for Fraud Detection

Language:PythonLicense:Apache-2.0Stargazers:681Issues:15Issues:13

Crypter

Crypter - Python3 based builder and ransomware compiled to Windows executable using PyInstaller

Language:PythonLicense:GPL-3.0Stargazers:627Issues:41Issues:82

Python-Ransomware

Python Ransomware Tutorial - YouTube tutorial explaining code + showcasing the ransomware with victim/target roles

Language:PythonLicense:MITStargazers:498Issues:21Issues:11

pyhtools

A Python Hacking Library consisting of network scanner, arp spoofer and detector, dns spoofer, code injector, packet sniffer, network jammer, email sender, downloader, wireless password harvester credential harvester, keylogger, download&execute, ransomware, data harvestors, etc.

Language:PythonLicense:MITStargazers:467Issues:7Issues:20

NetWorm

Python network worm that spreads on the local network and gives the attacker control of these machines.

Language:PythonLicense:MITStargazers:453Issues:24Issues:10

gnn-comparison

Official Repository of "A Fair Comparison of Graph Neural Networks for Graph Classification", ICLR 2020

Language:PythonLicense:GPL-3.0Stargazers:376Issues:8Issues:20

JPGtoMalware

It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography methods. For this reason, it does not cause any distortion in the JPG file. The JPG file size and payload do not have to be proportional.The JPG file is displayed normally in any viewing application or web application. It can bypass various security programs such as firewall, antivirus. If the file is examined in detail, it is easier to detect than steganography methods. However, since the payload in the JPG file is encrypted, it cannot be easily decrypted. It also uses the "garbage code insertion/dead-code insertion" method to prevent the payload from being caught by the antivirus at runtime.

Language:PythonLicense:NOASSERTIONStargazers:368Issues:9Issues:1

awesome-graph-attack-papers

Adversarial attacks and defenses on Graph Neural Networks.

dodrio

Exploring attention weights in transformer-based models with linguistic knowledge.

Language:SvelteLicense:MITStargazers:338Issues:6Issues:8

PyDGN

A research library for automating experiments on Deep Graph Networks

Language:PythonLicense:BSD-3-ClauseStargazers:213Issues:7Issues:14

Python-Ransomware

Complete Python RansomeWare Source Code With Full Decoumetions.

Language:PythonLicense:GPL-3.0Stargazers:203Issues:7Issues:9

RAT-Collection

Remote Access Trojan collection.(260+ RAT-Builders!)

TIGER

Python toolbox to evaluate graph vulnerability and robustness (CIKM 2021)

Language:PythonLicense:MITStargazers:149Issues:4Issues:6

BTC-Clipper

Bitcoin Clipper malware made in Python

AGE

Source code and dataset for KDD 2020 paper "Adaptive Graph Encoder for Attributed Graph Embedding"

malware-techniques

A collection of techniques commonly used in malware to accomplish core tasks.

Language:PythonLicense:MITStargazers:83Issues:7Issues:32

Dr0pFi

Using this tool, You can capture all WiFi Passwords stored on Windows Computer and mail them to your email account!