Shawn-Shan / fawkesLinks
Fawkes, privacy preserving tool against facial recognition systems. More info at https://sandlab.cs.uchicago.edu/fawkes
☆5,453Updated 2 years ago
Alternatives and similar repositories for fawkes
Users that are interested in fawkes are comparing it to the libraries listed below
Sorting:
- DeepPrivacy: A Generative Adversarial Network for Face Anonymization☆1,301Updated 2 years ago
- A temporary email right from your terminal written in POSIX sh☆4,139Updated last year
- Face Depixelizer based on "PULSE: Self-Supervised Photo Upsampling via Latent Space Exploration of Generative Models" repository.☆2,556Updated 10 months ago
- Removing people from complex backgrounds in real time using TensorFlow.js in the web browser☆5,166Updated 4 years ago
- « usbkill » is an anti-forensic kill-switch that waits for a change on your USB ports and then immediately shuts down your computer.☆4,561Updated last year
- Code for the paper: Detecting Photoshopped Faces by Scripting Photoshop☆1,603Updated 2 years ago
- ☆2,344Updated last year
- Collaborative office suite, end-to-end encrypted and open-source.☆7,072Updated this week
- Tinfoil Chat - Onion-routed, endpoint secure messaging system☆1,289Updated 5 months ago
- 🐸 Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell …☆7,087Updated 2 years ago
- The Project is real time application in opencv using first order model☆3,252Updated 4 years ago
- Privacy-respecting metasearch engine☆13,498Updated 2 years ago
- Linux/OSX/FreeBSD resource monitor☆11,056Updated 2 years ago
- A friendly browser-based tool for anonymizing photographs taken at protests☆984Updated 3 years ago
- ClearURLs is an add-on based on the new WebExtensions technology and will automatically remove tracking elements from URLs to help protec…☆4,586Updated 3 months ago
- Create fake phone contacts, to do data-poisoning.☆567Updated 4 years ago
- Securely and anonymously share files, host websites, and chat with friends using the Tor network☆6,748Updated 4 months ago
- An open-source digital image forensic toolset☆3,039Updated 4 months ago
- Never ever ever use pixelation as a redaction technique☆8,159Updated last year
- Hide secrets with invisible characters in plain text securely using passwords 🧙🏻♂️⭐☆3,732Updated last year
- Push-button installer of macOS Catalina, Mojave, and High Sierra guests in Virtualbox on x86 CPUs for Windows, Linux, and macOS☆13,562Updated 2 years ago
- Pack up to 3MB of data into a tweetable PNG polyglot file.☆2,580Updated 4 years ago
- A free, open source, and privacy-focused browser extension to block “not safe for work” content built using TypeScript and TensorFlow.js.☆1,756Updated last year
- a delightful machine learning tool that allows you to train, test, and use models without writing code☆3,134Updated 2 years ago
- Liquid Warping GAN with Attention: A Unified Framework for Human Image Synthesis☆2,411Updated 2 years ago
- A collection of all the data i could extract from 1 billion leaked credentials from internet.☆3,197Updated 5 years ago
- Promoting Solutions that Improve Wellbeing, Freedom and Society☆3,083Updated 3 years ago
- PULSE: Self-Supervised Photo Upsampling via Latent Space Exploration of Generative Models☆8,016Updated 4 years ago
- [CVPR 2020] 3D Photography using Context-aware Layered Depth Inpainting☆7,058Updated last year
- ⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡☆20,175Updated 8 months ago