Posts

Deepfake + Virtual Webcam Setup on Apple Silicon Mac

Image
Wanna try deepfake with your webcam on Mac? In this tutorial, I’ll show you how to run Deep-Live-Cam on Mac with Apple Silicon (M1/M2/M3). We’ll use Python, set up the virtual camera with OBS, and make it work with Omegle or other video platforms. Just follow step by step, no stress, it’s beginner friendly. Faiyaaa🔥 ⚙️ Installation Install Python 3.10 (Stable Version), download from the official website: https://www.python.org/downloads/macos/ Install FFmpeg: brew install ffmpeg Download the Deep-Live-Cam Repository: git clone https://github.com/hacksider/Deep-Live-Cam.git cd Deep-Live-Cam Download the Model Files: cd models/ wget https://huggingface.co/hacksider/deep-live-cam/resolve/main/GFPGANv1.4.pth  wget https://huggingface.co/hacksider/deep-live-cam/resolve/main/inswapper_128_fp16.onnx Create a Python Virtual Environment: python3.10 -m venv venv source venv/bin/activate Install Deep-Live-Cam Requirements: pip3.10 install -r requirements.txt Install CoreML Execution Pr...

FRO Attack Scenario

Image
 

Using ChatGPT to Generate Blog Header

Image
Whaddup y'all.. I just wonder, can i generate image for my blog header with chatGPT, and it works!   The problem is the generate image sometime not correct and my chatGPT is free version, i have limit to regenerate image untill i match with my blog. i have been generate 2 image   i will generate image until in really match with my blog, update soon!

Mastering OWASP Risk Rating

Image
Whaddup y'all.. Besides the well-known CVSS, there’s actually an alternative risk assessment method, especially for web pentests, called the OWASP Risk Rating. As the name suggests, this method is provided by the OWASP organization. Luckily, someone made a calculator so you don’t have to manually calculate the score. But it still uses pretty formal language, which can be confusing sometimes. I’ve made a simpler explanation for each factor, hope it helps you understand better!🔥 1. Likelihood Factors The first step is to estimate how likely it is that an attacker will find and exploit the vulnerability. There are two sub-factors: the threat agent factor and the vulnerability factor. a) Threat Agent Factors b) Vulnerability Factors 2. Impact Factors After a successful attack, the next step is to estimate the technical and business impacts of the vulnerability. There are two sub-factors: the technical impact factor and the business impact factor. a) Technical Impact Factors b) B...