Shawn-Shan / fawkes
Fawkes, privacy preserving tool against facial recognition systems. More info at https://sandlab.cs.uchicago.edu/fawkes
☆5,288Updated last year
Alternatives and similar repositories for fawkes:
Users that are interested in fawkes are comparing it to the libraries listed below
- An open-source digital image forensic toolset☆2,753Updated 3 months ago
- A temporary email right from your terminal written in POSIX sh☆3,922Updated 6 months ago
- A self contained OBS -> FTL -> WebRTC live streaming server. Comprised of 3 parts once configured anyone can achieve sub-second OBS to th…☆3,639Updated last year
- DeepPrivacy: A Generative Adversarial Network for Face Anonymization☆1,286Updated last year
- Berty is a secure peer-to-peer messaging app that works with or without internet access, cellular data or trust in the network☆7,748Updated last week
- A collection of all the data i could extract from 1 billion leaked credentials from internet.☆3,102Updated 4 years ago
- Repository for our paper Wearable Microphone Jamming☆851Updated 5 years ago
- A temporary SMS utility right from your terminal written in POSIX sh☆1,043Updated last year
- Faster than the fastest in the world pixel-by-pixel image difference tool.☆1,692Updated 3 years ago
- Serverless, peer-to-peer, local file sharing through sound☆2,218Updated 4 years ago
- Free and Open Source Reverse Engineering Platform powered by rizin☆16,180Updated 2 weeks ago
- SSH tarpit that slowly sends an endless banner☆7,562Updated 8 months ago
- NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewa…☆1,911Updated 2 years ago
- Simple, private file sharing from the makers of Firefox☆13,254Updated 3 years ago
- ☆8,735Updated 9 months ago
- Convert Apple NeuralHash model for CSAM Detection to ONNX.☆1,536Updated 3 years ago
- API, CLI, and Web App for analyzing and finding a person's profile in 1000 social media \ websites☆12,131Updated last month
- Hide secrets with invisible characters in plain text securely using passwords 🧙🏻♂️⭐☆3,450Updated 4 months ago
- TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.☆24,047Updated 2 months ago
- Private front-end for Reddit☆5,073Updated this week
- qTox is a chat, voice, video, and file transfer IM client using the encrypted peer-to-peer Tox protocol.☆4,794Updated this week
- Execute a local command using the processing power of another Linux machine.☆3,129Updated 2 years ago
- Infinite adventures await!☆3,198Updated 4 years ago
- Animation of the SHA-256 hash function in your terminal.☆3,346Updated 11 months ago
- HiddenVM — Use any desktop OS without leaving a trace.☆2,405Updated 7 months ago
- A Social Media Enumeration & Correlation Tool by Jacob Wilkin(Greenwolf)☆3,872Updated 2 years ago
- Stealth - Secure, Peer-to-Peer, Private and Automateable Web Browser/Scraper/Proxy☆1,062Updated last year
- This is a list of substantial, commercial-or-social-good mainstream websites which provide onion services.☆1,792Updated this week
- Preimage attack against NeuralHash 💣☆672Updated last year
- uMatrix: Point and click matrix to filter net requests according to source, destination and type☆4,582Updated 3 years ago