AsuharietYgvar / AppleNeuralHash2ONNXLinks
Convert Apple NeuralHash model for CSAM Detection to ONNX.
☆1,536Updated 4 years ago
Alternatives and similar repositories for AppleNeuralHash2ONNX
Users that are interested in AppleNeuralHash2ONNX are comparing it to the libraries listed below
Sorting:
- Preimage attack against NeuralHash 💣☆673Updated 3 months ago
- Upload arbitrary data via Apple's Find My network.☆1,869Updated 2 years ago
- ☆856Updated 3 years ago
- Craft PNG files that appear completely different in Apple software [NOW PATCHED]☆1,064Updated 3 years ago
- Dissecting the M1's GPU for 3D acceleration☆1,015Updated 3 years ago
- ☆1,506Updated 3 years ago
- Trojan Source: Invisible Vulnerabilities☆1,275Updated 2 years ago
- An open source implementation of Apple's Wi-Fi Password Sharing protocol in Python.☆831Updated 4 years ago
- Recover old Snaps that have “disappeared” from Snapchat☆432Updated 4 years ago
- Indicators of Compromise from Amnesty International's cyber investigations☆1,637Updated last year
- A Pluggable Authentication Module (PAM) which allows the establishment of alternate passwords that can be used to perform actions to clea…☆1,371Updated 2 months ago
- Linux kernel source tree☆870Updated 4 years ago
- An open Apple Wireless Direct Link (AWDL) implementation written in C☆1,439Updated last year
- ☆525Updated 2 years ago
- iPhone 11 emulated on QEMU☆2,180Updated 3 years ago
- A catalog of naturally occurring images whose Apple NeuralHash is identical.☆148Updated 3 years ago
- Protect yourself from being tracked 🌍 by AirTags 🏷 and Find My accessories 📍☆2,210Updated this week
- Design custom QR codes with this web app!☆446Updated 2 years ago
- NAalytics / Assemblies-of-putative-SARS-CoV2-spike-encoding-mRNA-sequences-for-vaccines-BNT-162b2-and-mRNA-1273RNA vaccines have become a key tool in moving forward through the challenges raised both in the current pandemic and in numerous other pu…☆3,365Updated 4 years ago
- C++ `std::unique_ptr` that represents each object as an NFT on the Ethereum blockchain☆2,018Updated 4 years ago
- A proof-of-concept Android application to detect and defeat some of the Cellebrite UFED forensic toolkit extraction techniques.☆346Updated last year
- Redirect `.idk` domains using Wikipedia☆1,553Updated 2 months ago
- This Word Does Not Exist☆1,020Updated 3 years ago
- min(DALL·E) is a fast, minimal port of DALL·E Mini to PyTorch☆3,495Updated 8 months ago
- Create fake phone contacts, to do data-poisoning.☆568Updated 4 years ago
- Extracted media files from North Korean OS, Red Star 3.0☆232Updated 4 years ago
- Pack up to 3MB of data into a tweetable PNG polyglot file.☆2,577Updated 4 years ago
- tic-tac-toe in a single call to printf☆2,350Updated 3 years ago
- Showcasing what in-app browsers do under the hood☆478Updated 3 years ago
- Customize your git commit hashes!☆1,914Updated 8 months ago