RuiSiang / Face2IDLinks
Project to quickly transform face biometrics into UUIDs
☆23Updated last year
Alternatives and similar repositories for Face2ID
Users that are interested in Face2ID are comparing it to the libraries listed below
Sorting:
- A tool for creating bitcoin stealing phishing clones of onion services on large scale☆36Updated 2 years ago
- List of groups that are carrying out cyber actions in the conflict between Israel and Iran.☆29Updated 4 months ago
- When a TorBrowser user switches tabs (to another TorBrowser tab or to his clearnet browser) his sessions can be linked from the mouse ent…☆16Updated 11 months ago
- CF GeoBypasser Cyberpunk Framework is a Modular Offensive Toolkit designed to discover and bypass Cloudflare-based Geo-restrictions using…☆45Updated 3 weeks ago
- This script allows you to quickly search for terms on Pastebin using various search engines. It supports multiple browsers and handles sp…☆38Updated 3 weeks ago
- SMSgate is an open source Python-based server for sending and especially receiving SMS using multiple GSM modems and SIM cards.☆196Updated last month
- Curated list of data leaks around the world☆76Updated 3 years ago
- Proof of Work protected TCP server.☆30Updated 2 years ago
- Cannahome source code and database☆12Updated 2 years ago
- PNG steganography tool.☆17Updated last week
- Host your website on the Tor 🧅 network in less than 2 minutes ⌛️ with this tiny 🤏🏻 (less than ~15MB) docker image 🎊☆30Updated 4 years ago
- An ARP/NDP swiss army knife to make MAC going nuts on networks around!☆16Updated last year
- A reverse search tool for OSINT (Open Source Intelligence) gathering & facial recognition via Google Custom Search & Google Vision API's.☆51Updated last year
- Self-contained script for cleaning forensic traces on Linux, macOS, and Windows.☆287Updated 5 months ago
- PEGASUS-NEO is a comprehensive penetration testing framework designed for security professionals and ethical hackers. It combines multipl…☆103Updated 2 months ago
- Rubber Ducky powered by NeoKey☆28Updated last year
- A quantum enhanced, totaly private encryption app that uses true random key generation from zero point energy.☆13Updated 6 months ago
- This is a setup for a Tor based mail hosting server☆24Updated 2 months ago
- The script uses an Google maps API to download photos of places in the area specified by coordinates and search radius☆20Updated 2 years ago
- An I2P based OS made for security☆14Updated 11 months ago
- A web service to clean documents from potentially privacy-invasive metadata☆50Updated 8 months ago
- Entity graphs, OSINT data mining, and plugins. Connect unstructured and public data for transformative insights 🌐 (Electron version • Co…☆136Updated last month
- A turbo traffic generator pentesting tool to generate random traffic with random MAC and IP addresses in addition to random sequence numb…☆160Updated last month
- A tool to automatically redirect all traffic through the TOR and change the IP every 0 to x seconds. And provides a custom MAC address. <…☆97Updated last year
- Free to use http, socks4 and socks5 proxies updated every 30 minutes.☆34Updated 2 months ago
- Anonymous p2p chat application in C++ based on onion relay concept.☆42Updated 5 years ago
- Integrate LLM models directly into Ghidra for automated code rewrite and analysis.☆225Updated 3 weeks ago
- Basic website cloner written in Python☆53Updated 2 years ago
- Transparent proxy through Tor with optionally DNSCrypt and Anonymized-DNS feature enabled.☆14Updated last year
- Convolutional Neural Network that classifies voice clips as human or AI with 94% accuracy.☆69Updated 6 months ago