ThoughtfulDev / person-blockerView external linksLinks
Automatically "block" people in images (like Black Mirror) using a pretrained neural network.
☆23Mar 31, 2018Updated 7 years ago
Alternatives and similar repositories for person-blocker
Users that are interested in person-blocker are comparing it to the libraries listed below
Sorting:
- Arduino-based network monitor☆24Sep 19, 2011Updated 14 years ago
- 802.11 IDS, visualizer, and analytics platform for the web☆29Jan 4, 2023Updated 3 years ago
- ☆13Jul 13, 2020Updated 5 years ago
- A little Python Script for cracking Windows Passwords with the help of CrackMapExec☆33Oct 11, 2017Updated 8 years ago
- Repository for the OWASP/WASC Distributed Web Honeypots Project -☆35Apr 16, 2015Updated 10 years ago
- Module to use a Minecraft Server through Metasploit☆10Oct 19, 2013Updated 12 years ago
- A High-Frequency Market-Making bot for CoinCheck.jp☆11Oct 30, 2017Updated 8 years ago
- User Guide present in Trezor Suite☆12Jan 8, 2026Updated last month
- A huge base of icons coins (cryptocurrencies). 1887 icons from 16x16 to 128x28.☆12Apr 17, 2018Updated 7 years ago
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- Android app for tracking your locations and uploading them on your private server☆11Jul 1, 2017Updated 8 years ago
- TCP session interception and injection framework☆55Mar 22, 2011Updated 14 years ago
- Modern Honey Network deployment with ansible☆12Jun 4, 2022Updated 3 years ago
- This package includes Artisan Commands to create directory structure.☆10Mar 26, 2022Updated 3 years ago
- ☆15Mar 3, 2021Updated 4 years ago
- This python script can help you to detect what object is in moving.☆12Nov 28, 2018Updated 7 years ago
- Exfiltrate all saved Wi-Fi passwords from a Windows PC☆13Sep 14, 2023Updated 2 years ago
- HID USB Manager for OSX. This is a Framework to make working with HID USB Devices easier. Uses IOKit to manage the devices☆13Mar 5, 2016Updated 9 years ago
- Acala Foundation Grants Program☆10Apr 27, 2021Updated 4 years ago
- XYO Archivist SDK☆12Jan 7, 2023Updated 3 years ago
- ☆12Mar 9, 2022Updated 3 years ago
- C# SDK for SecureAuth IdP API☆11May 31, 2023Updated 2 years ago
- Ansible roles for automated deployement and maintenance of Linux servers, network services and applications.☆10Updated this week
- Wide internet scanner for etherum and other bitcoin mining devices using default SSH credentials☆48Mar 22, 2022Updated 3 years ago
- ☆46Jun 1, 2023Updated 2 years ago
- Mass malicious script dump/Malware src dump☆16Nov 25, 2016Updated 9 years ago
- Decode the signal from an infrared wand toy☆13Jan 3, 2020Updated 6 years ago
- Netwitness Maltego integration Project☆18May 9, 2017Updated 8 years ago
- A simple GNU Radio message based burst FSK Transmitter and Receiver☆12May 31, 2015Updated 10 years ago
- Security related data and information for all aspects of Grin☆14Aug 2, 2021Updated 4 years ago
- In photographic media, faces are often obfuscated to protect the identity of those pictured. This obfuscation process is done by removing…☆12Jan 10, 2019Updated 7 years ago
- Official Go implementation of the Ethereum protocol☆11Nov 25, 2024Updated last year
- ☆13Nov 25, 2025Updated 2 months ago
- ☆15Oct 14, 2021Updated 4 years ago
- TP-Link TL-WR1043ND - Authenticated Remote Code Execution☆16Jul 29, 2025Updated 6 months ago
- zkSNARK full flow example in Go☆12Jun 3, 2020Updated 5 years ago
- Exporters for OllyDbg and ImmunityDbg for use with zynamics BinNavi <= 3.0☆18Jan 10, 2012Updated 14 years ago
- How to Deploy a Dapp to the POA Network☆12Aug 6, 2018Updated 7 years ago
- Chaotic Crypto Stealth VPN for Anonymity and Untraceable Hacking Attacks with Linux and Android☆110Aug 18, 2020Updated 5 years ago