AsuharietYgvar / AppleNeuralHash2ONNXLinks
Convert Apple NeuralHash model for CSAM Detection to ONNX.
β1,536Updated 4 years ago
Alternatives and similar repositories for AppleNeuralHash2ONNX
Users that are interested in AppleNeuralHash2ONNX are comparing it to the libraries listed below
Sorting:
- Preimage attack against NeuralHash π£β673Updated 2 years ago
- An open letter against Apple's new privacy-invasive client-side content scanning.β631Updated 2 years ago
- Craft PNG files that appear completely different in Apple software [NOW PATCHED]β1,068Updated 3 years ago
- Upload arbitrary data via Apple's Find My network.β1,858Updated last year
- Dissecting the M1's GPU for 3D accelerationβ1,010Updated 3 years ago
- NAalytics / Assemblies-of-putative-SARS-CoV2-spike-encoding-mRNA-sequences-for-vaccines-BNT-162b2-and-mRNA-1273RNA vaccines have become a key tool in moving forward through the challenges raised both in the current pandemic and in numerous other puβ¦β3,361Updated 3 years ago
- Everything we actually know about the Apple Neural Engine (ANE)β2,259Updated 6 months ago
- An open source implementation of Apple's Wi-Fi Password Sharing protocol in Python.β831Updated 4 years ago
- β857Updated 3 years ago
- A Pluggable Authentication Module (PAM) which allows the establishment of alternate passwords that can be used to perform actions to cleaβ¦β1,363Updated 5 months ago
- Linux kernel source treeβ873Updated 4 years ago
- C++ `std::unique_ptr` that represents each object as an NFT on the Ethereum blockchainβ2,024Updated 4 years ago
- Trojan Source: Invisible Vulnerabilitiesβ1,270Updated 2 years ago
- A module for initiating the communist revolution in each of our python modulesβ763Updated 3 years ago
- This is not youtube-dlβ879Updated 4 years ago
- A stealth AirTag clone that bypasses all of Apple's tracking protection featuresβ1,197Updated 3 years ago
- tic-tac-toe in a single call to printfβ2,338Updated 3 years ago
- A proof-of-concept Android application to detect and defeat some of the Cellebrite UFED forensic toolkit extraction techniques.β341Updated last year
- iPhone 11 emulated on QEMUβ2,164Updated 2 years ago
- Use Log4Shell vulnerability to vaccinate a victim server against Log4Shellβ1,709Updated 3 years ago
- Design custom QR codes with this web app!β444Updated 2 years ago
- Redirect `.idk` domains using Wikipediaβ1,531Updated last year
- Quake 1 game port to Apple Watchβ734Updated 2 years ago
- β535Updated last year
- β520Updated last year
- Browser plugin to autoblock NFT users on Twitter.β617Updated last year
- a recurrent network trained to draw dicksβ613Updated 5 years ago
- β1,444Updated 4 years ago
- fastest text uwuifier in the westβ1,413Updated last year
- β270Updated 6 years ago