β16Mar 6, 2024Updated 2 years ago
Alternatives and similar repositories for generated-image-detection
Users that are interested in generated-image-detection are comparing it to the libraries listed below
Sorting:
- β43Mar 6, 2024Updated 2 years ago
- a scaling framework for tor traffic balancing 𧦠π§ βοΈβ14Nov 10, 2025Updated 4 months ago
- Napkin is a simple tool to produce statistical analysis of a textβ12Feb 25, 2024Updated 2 years ago
- Convert ADS-B data to delay-Doppler truthβ22Sep 24, 2025Updated 5 months ago
- Scapy sockets to communicate with Bluetooth controllersβ20Mar 2, 2026Updated 2 weeks ago
- Code for the paper: ConDA: Contrastive Domain Adaptation for AI-generated Text Detectionβ41Dec 21, 2023Updated 2 years ago
- External twitter feeder for AIL frameworkβ16Apr 16, 2023Updated 2 years ago
- CocktailParty is a data broker system based on phoenix frameworkβ23Apr 23, 2025Updated 10 months ago
- DSP-FWA: Dual Spatial Pyramid for Exposing Face Warp Artifacts in DeepFake Videosβ69Mar 13, 2024Updated 2 years ago
- Create a social network graph based on coappearance in imagesβ18Jul 29, 2022Updated 3 years ago
- β23Oct 28, 2022Updated 3 years ago
- A CLI tool that converts DER or PEM encoded ASN.1 structures into an equivalent textual description compatible with OpenSSL's ASN1_generaβ¦β25Jan 21, 2026Updated last month
- A collection of domain lists obtained from zone-walking TLDs. Updated daily.β29Updated this week
- A Python implementation of our efficient Bloom filter library.β29Feb 27, 2020Updated 6 years ago
- Real World Occluded Face dataset containing 3195 neutral images, 1686 sunglasses images and 678 masked images.β40Nov 29, 2021Updated 4 years ago
- Lists of not-suitable-for-work words as YARA rulesβ29Feb 2, 2026Updated last month
- A set of YARA rules for the AIL framework to detect leak or information disclosureβ42Jan 31, 2025Updated last year
- CIRCL system forensic tools or a jumble of tools to support forensicβ41Jan 20, 2023Updated 3 years ago
- Weakly supervised deepfake localizationβ30Aug 4, 2025Updated 7 months ago
- Crawler that retrieves commoncrawl's crawled hosts and their corresponding IPsβ21Sep 1, 2025Updated 6 months ago
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users inβ¦β35Oct 21, 2025Updated 4 months ago
- A UserScript to detect GPT generated comments on Hackernews.β13Dec 10, 2022Updated 3 years ago
- Create and manage chroot/jail environmentsβ51May 21, 2023Updated 2 years ago
- USB Scanning deviceβ33Sep 16, 2025Updated 6 months ago
- A database for storing, querying and doing stats on credential leaksβ40May 23, 2023Updated 2 years ago
- Pythia is a versatile query format designed to facilitate the discovery of malicious infrastructure by seamlessly converting into the synβ¦β34Aug 7, 2024Updated last year
- Deepfakes with an adversarial twist.β28Jul 28, 2020Updated 5 years ago
- π A JavaScript library that provides a score for the likelihood of a user using a headless browser.β37Jan 13, 2021Updated 5 years ago
- Authors official PyTorch implementation of the "ContraCLIP: Interpretable GAN generation driven by pairs of contrasting sentences".β42Oct 1, 2022Updated 3 years ago
- β61Jul 4, 2024Updated last year
- Source code of the paper: Effective Image Tampering Localization with Multi-Scale ConvNeXt Feature Fusion, JVCIR 2024.β37Feb 2, 2024Updated 2 years ago
- Python bindings for MetroHashβ20Oct 9, 2025Updated 5 months ago
- β39Jan 12, 2021Updated 5 years ago
- MXNet implementation for DenseNetβ28Aug 12, 2017Updated 8 years ago
- signs things with ssh-ed25519 keysβ13Jan 4, 2019Updated 7 years ago
- β24Mar 12, 2025Updated last year
- Python port of polygon clipping algorithm by F. Martinez et al. (with separate C++ binding)β10Dec 18, 2020Updated 5 years ago
- Capture a URL with Playwrightβ30Mar 12, 2026Updated last week
- Base45β22Feb 20, 2026Updated last month