Automatically "block" people in images (like Black Mirror) using a pretrained neural network.
☆23Mar 31, 2018Updated 7 years ago
Alternatives and similar repositories for person-blocker
Users that are interested in person-blocker are comparing it to the libraries listed below
Sorting:
- log file scrubber☆15Jul 27, 2018Updated 7 years ago
- Arduino-based network monitor☆24Sep 19, 2011Updated 14 years ago
- REST API for provider of data services☆28Jan 19, 2026Updated last month
- 802.11 IDS, visualizer, and analytics platform for the web☆29Jan 4, 2023Updated 3 years ago
- ☆13Jul 13, 2020Updated 5 years ago
- A High-Frequency Market-Making bot for CoinCheck.jp☆10Oct 30, 2017Updated 8 years ago
- Android app for tracking your locations and uploading them on your private server☆11Jul 1, 2017Updated 8 years ago
- A huge base of icons coins (cryptocurrencies). 1887 icons from 16x16 to 128x28.☆12Apr 17, 2018Updated 7 years ago
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- TCP session interception and injection framework☆55Mar 22, 2011Updated 14 years ago
- HID USB Manager for OSX. This is a Framework to make working with HID USB Devices easier. Uses IOKit to manage the devices☆13Mar 5, 2016Updated 10 years ago
- Acala Foundation Grants Program☆10Apr 27, 2021Updated 4 years ago
- This package includes Artisan Commands to create directory structure.☆10Mar 26, 2022Updated 3 years ago
- A Android program help you learn English.☆13Mar 18, 2024Updated last year
- Modern Honey Network deployment with ansible☆12Jun 4, 2022Updated 3 years ago
- This python script can help you to detect what object is in moving.☆12Nov 28, 2018Updated 7 years ago
- C# SDK for SecureAuth IdP API☆11May 31, 2023Updated 2 years ago
- GRAnd: Extra blocks, IO, and tools for GNU Radio on Android☆10Aug 27, 2015Updated 10 years ago
- ☆46Jun 1, 2023Updated 2 years ago
- 🌐 Aqua dApp☆10Oct 24, 2022Updated 3 years ago
- Metasploit RPC controller application☆11Aug 20, 2018Updated 7 years ago
- Web Audio Playback☆12Aug 3, 2017Updated 8 years ago
- ☆10Mar 13, 2018Updated 7 years ago
- An OSINT tool to find data leaks on a targeted website☆17Mar 30, 2021Updated 4 years ago
- ☆15Nov 7, 2021Updated 4 years ago
- An easy way to integrate Database Settings with Laravel☆13Mar 4, 2020Updated 6 years ago
- Mono-repo for Oracle Adapters☆10Feb 20, 2024Updated 2 years ago
- Arduino/ESP32 module for easily manage multiple LED blinking/breathing or Buzzer beats with different pattern. Work with digital pin (bli…☆11Feb 6, 2021Updated 5 years ago
- Exporters for OllyDbg and ImmunityDbg for use with zynamics BinNavi <= 3.0☆18Jan 10, 2012Updated 14 years ago
- CP Token serves as a medium of exchange to access specialized ICO reports on the Crypto-Potential platform.☆19Dec 5, 2019Updated 6 years ago
- CryptoTrojan in Python (For educational purpose ONLY)☆50Mar 23, 2018Updated 7 years ago
- Chaotic Crypto Stealth VPN for Anonymity and Untraceable Hacking Attacks with Linux and Android☆110Aug 18, 2020Updated 5 years ago
- In photographic media, faces are often obfuscated to protect the identity of those pictured. This obfuscation process is done by removing…☆12Jan 10, 2019Updated 7 years ago
- Protect your sensitive HTML content with this AES encryption HTML loader. User will need to key in password in order to view the HTML con…☆11May 5, 2015Updated 10 years ago
- DEPRECATED - The Square Payment Form Ember addon lets you take payments securely and easily in your Ember app using a familiar, component…☆14Jul 11, 2023Updated 2 years ago
- Nmap results are a semigroup☆13Jul 8, 2021Updated 4 years ago
- Mining Server Detector of Cryptocurrency Pools☆11Jan 5, 2023Updated 3 years ago
- Identicon implementation in Rust☆11Aug 7, 2023Updated 2 years ago
- ☆11Mar 14, 2022Updated 3 years ago