Shawn-Shan / fawkesLinks
Fawkes, privacy preserving tool against facial recognition systems. More info at https://sandlab.cs.uchicago.edu/fawkes
☆5,444Updated 2 years ago
Alternatives and similar repositories for fawkes
Users that are interested in fawkes are comparing it to the libraries listed below
Sorting:
- An open-source digital image forensic toolset☆3,004Updated 3 months ago
- ClearURLs is an add-on based on the new WebExtensions technology and will automatically remove tracking elements from URLs to help protec…☆4,572Updated 3 months ago
- [CVPR 2020] 3D Photography using Context-aware Layered Depth Inpainting☆7,056Updated last year
- DeepPrivacy: A Generative Adversarial Network for Face Anonymization☆1,300Updated last year
- A friendly browser-based tool for anonymizing photographs taken at protests☆981Updated 3 years ago
- Securely and anonymously share files, host websites, and chat with friends using the Tor network☆6,718Updated 3 months ago
- 💁♀️Your new best friend powered by an artificial neural network☆3,720Updated 8 months ago
- Linux/OSX/FreeBSD resource monitor☆11,039Updated 2 years ago
- Hide-My-Windows Laser Tripwire☆3,961Updated 2 years ago
- A collection of all the data i could extract from 1 billion leaked credentials from internet.☆3,199Updated 5 years ago
- HACL*, a formally verified cryptographic library written in F*☆1,792Updated last week
- Clone a voice in 5 seconds to generate arbitrary speech in real-time☆58,720Updated last month
- HiddenVM — Use any desktop OS without leaving a trace.☆2,482Updated last year
- Tinfoil Chat - Onion-routed, endpoint secure messaging system☆1,285Updated 4 months ago
- Hide secrets with invisible characters in plain text securely using passwords 🧙🏻♂️⭐☆3,656Updated last year
- Cross-platform application for easy encrypted file, folder, and text sharing between devices.☆1,193Updated this week
- This repository contains the source code for the paper First Order Motion Model for Image Animation☆14,948Updated 11 months ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆4,435Updated this week
- A temporary email right from your terminal written in POSIX sh☆4,014Updated last year
- Trojan Source: Invisible Vulnerabilities☆1,272Updated 2 years ago
- Convert Apple NeuralHash model for CSAM Detection to ONNX.☆1,536Updated 4 years ago
- A Dead Simple VPN.☆5,266Updated 4 months ago
- Simple, private file sharing. Mirror of https://gitlab.com/timvisee/send☆5,523Updated 4 months ago
- MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.☆11,798Updated last week
- 🛡🛠 You are being watched. Protect your privacy against global mass surveillance.☆3,137Updated 3 years ago
- Librefox: Firefox with privacy enhancements☆1,761Updated 4 years ago
- Transmits AM radio on computers without radio transmitting hardware.☆6,628Updated last year
- dnscrypt-proxy 2 - A flexible DNS proxy, with support for encrypted DNS protocols.☆12,592Updated last week
- Firefox privacy, security and anti-tracking: a comprehensive user.js template for configuration and hardening☆11,733Updated 3 weeks ago
- Create fake phone contacts, to do data-poisoning.☆570Updated 4 years ago