Moozonian

💻 Developer Nexus: perpetrate

GitHub

codedance/Retaliation

A Jenkins "Extreme Feedback" Contraption - fire foam rockets at build breaking perpetrators.

⭐ 603 | 🍴 84
GitHub

lies-exposed/lies.exposed

A chronological tracking of lies perpetrated against humanity.

⭐ 30 | 🍴 1
GitHub

PritomDas/Cyber-Attack-Attribution-with-Machine-Learning

Cyber attack attribution is the process of attempting to trace back a piece of code or malware to a perpetrator of a cyberattack. As cyber attacks have become more prevalent, cyber attack attribution becomes more valuable. The process of cyber attack attribution can be done using reverse engineering. From the metadata of the malware executable file, we can gather data such as date of creation, variable names used, and what library calls are imported. This information can be used as features for attribution analysis. We need to extract the features from malware that can be used for attribution and analyse them using some technique to attribute the attacks.

⭐ 15 | 🍴 9
GitHub

Laoode/Theft_Detection

Automatic Thief Detection via CCTV with Alarm System and Perpetrator Image Capture using YOLOv5 + ROI. This project utilizes computer vision technology to automatically detect the presence of thieves in CCTV footage. When a thief is detected, the system activates an alarm and captures an image of the perpetrator for further action

⭐ 14 | 🍴 5