Allows infinite streaming of a video as webcam output for different applications like Zoom, Skype etc.
☆21Aug 4, 2021Updated 4 years ago
Alternatives and similar repositories for Fake-Stream
Users that are interested in Fake-Stream are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Watch YouTube without any ads! Skip ads prior to the actual video content and blocks any pop-up ads during the video within the frame☆13Feb 25, 2022Updated 4 years ago
- PeopleScrap is used to gather information (OSINT) about people in a company☆11Jan 22, 2019Updated 7 years ago
- Awesome Hacking Tools☆14May 11, 2018Updated 7 years ago
- Privacy-enabling tools for onchain Provable querying☆15Apr 26, 2019Updated 6 years ago
- Socket Programming☆22Apr 29, 2019Updated 6 years ago
- A good free advice or quote every day!☆28Sep 12, 2018Updated 7 years ago
- A simple Edge Detection using the Sobel operator☆17Jun 29, 2018Updated 7 years ago
- A guide on how to containerize, package, and run a Spring Boot application on an Open Liberty server without modification.☆21Mar 1, 2026Updated 3 weeks ago
- A minimal android controller library for Tor☆25Aug 30, 2019Updated 6 years ago
- a cat-like cli tool to showcase argument parsing☆12Nov 4, 2021Updated 4 years ago
- Control LED from android using Bluetooth module and Arduino board☆24May 12, 2019Updated 6 years ago
- This is a multi-page streamlit app to showcase Sharone's streamlit app examples☆14Feb 17, 2022Updated 4 years ago
- ☆15Jun 12, 2018Updated 7 years ago
- CyberScan☆26Feb 21, 2018Updated 8 years ago
- Debounce library for Arduino☆17Feb 13, 2024Updated 2 years ago
- Run it as administrator and wait☆13Apr 5, 2020Updated 5 years ago
- A series of Jupyter Notebooks that demonstrate how to scrape data from the S&P Capital IQ Website, provided that you already have access …☆18Sep 20, 2019Updated 6 years ago
- Utilizing various Open Source Intelligence (OSINT) tools and techniques that we have found to be effective, DataSploit brings them all in…☆32Mar 25, 2017Updated 8 years ago
- You can download the YouTube video for free and convert it to any extension you want.☆23Feb 21, 2019Updated 7 years ago
- Single Python Project enabling quick infrastructure loading (SMB Servers, HTTP File Server, FTP, Webpage, NetScanner)☆13Jan 15, 2024Updated 2 years ago
- Decrypt Matrix42 Empirum /EIS Passwords☆14Mar 31, 2021Updated 4 years ago
- ☆10Jan 17, 2022Updated 4 years ago
- AXGraphView creates zoomable and scrollable graphs based on function or custom draw.☆49Aug 14, 2021Updated 4 years ago
- Implementation of text clustering using fastText word embedding and k-means algorithm☆25Jul 2, 2020Updated 5 years ago
- ☆14Sep 26, 2023Updated 2 years ago
- sms-hacker using metasploit☆40Feb 17, 2017Updated 9 years ago
- Edit Batch files with Visual Studio Code☆27Feb 11, 2026Updated last month
- Maltego integration of https://haveibeenpwned.com☆61Mar 12, 2025Updated last year
- .NET wrapper around LogonUserA to test creds☆12Jun 2, 2022Updated 3 years ago
- LLM Vulnerable Application☆13Aug 19, 2023Updated 2 years ago
- Pure standard C99 macro implementation to overload and set optional default parameters of C/C++ functions.☆22Jan 23, 2015Updated 11 years ago
- No one writes dumb malware anymore. This is a repo for dumb malware.☆10Apr 18, 2017Updated 8 years ago
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- Creating CS:GO server with skins, ws, gloves, knife, rank, rs, etc. both with a bash file and using a docker file.☆16Sep 11, 2022Updated 3 years ago
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆12Sep 15, 2023Updated 2 years ago
- Useme Alehosaini☆18Nov 29, 2025Updated 3 months ago
- Seven different DLL injection techniques in one single project.☆12May 19, 2020Updated 5 years ago
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆23Jul 31, 2025Updated 7 months ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆15Jun 5, 2017Updated 8 years ago