Clone a voice in 5 seconds to generate arbitrary speech in real-time
☆22Aug 24, 2021Updated 4 years ago
Alternatives and similar repositories for Real-Time-Voice-Cloning
Users that are interested in Real-Time-Voice-Cloning are comparing it to the libraries listed below
Sorting:
- 'mispitools' is an open-source package written in the R statistical language. It consists of a collection of decision-making tools design…☆37Updated this week
- CyberSpy is a repository with innate and third party services that can be used for doxing, profiling & identity searching.☆11Jul 8, 2019Updated 6 years ago
- 二多Lab是一个集数独游戏与福卡设计于一体 的微信小程序,项目完全使用 Cursor AI 辅助开发。本次开源不仅包含完整的项目源码,更重要的是分享了与 AI 结对编程的全过程和经验总结。☆10Feb 9, 2025Updated last year
- ☆13Jun 29, 2023Updated 2 years ago
- This tool is design for FTP brute force☆13Jan 23, 2024Updated 2 years ago
- 3D printed mini circular table saw.☆11Jul 19, 2014Updated 11 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Jun 16, 2020Updated 5 years ago
- Brahmastra empowers security teams to fortify their defenses and identify potential vulnerabilities in their systems. This comprehensive …☆18Aug 20, 2023Updated 2 years ago
- 电子书+语音阅读☆10Mar 12, 2016Updated 9 years ago
- Sponsored By Mr ROBOT☆14Nov 15, 2020Updated 5 years ago
- WpDisect is a wordpress hacking tool that finds vulnerabilities in wordpress.☆14Feb 20, 2022Updated 4 years ago
- pypassport is library to read and parse biometric passport.☆13Nov 15, 2024Updated last year
- Wordlists generated over the years of penetration testing☆14Mar 18, 2025Updated 11 months ago
- Rust Weaponization for Red Team Engagements.☆12Nov 14, 2022Updated 3 years ago
- Repository of open knowledge about web scraping in Python☆13May 30, 2022Updated 3 years ago
- checks various security features of a system, including firewall, intrusion detection system (IDS),Intrusion Prevention Systems (IPS), Ne…☆11Feb 21, 2023Updated 3 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆12Apr 25, 2017Updated 8 years ago
- Script which is able to decrypt data sent to AzoRult 3.3 Server☆11Feb 5, 2021Updated 5 years ago
- A repo to help you train a custom image detector using the state-of-the-art YOLOv5. This model will allow real-time drone swarm detection…☆13Jan 8, 2022Updated 4 years ago
- 萌否电台 HTML5 版本(非官方)☆11Jan 1, 2018Updated 8 years ago
- Automated enumeration for red teamers☆10Nov 22, 2022Updated 3 years ago
- his program shows you IMSI numbers, country, brand and operator of cellphones around you. /!\ This program was made to understand how GS…☆13Dec 27, 2018Updated 7 years ago
- A Python Program that uses OpenCV and Scapy module to brute force RTSP (Real Time Streaming Protocol) Service used by IoT (Internet of Th…☆10Oct 31, 2024Updated last year
- My Simple Pure Python Script To DoS And Deauthenticate Any Wifi Router..☆14Apr 12, 2021Updated 4 years ago
- ☆19Aug 17, 2018Updated 7 years ago
- Build your very own (very simple) botnet!☆16May 13, 2022Updated 3 years ago
- The best tool to check the list of phone numbers for cut which have Telegram accounts☆11Oct 14, 2025Updated 4 months ago
- Explore RootSec's DDOS Archive, featuring top-tier scanners, powerful botnets (Mirai & QBot) and other variants, high-impact exploits, ad…☆14Aug 22, 2024Updated last year
- This tool is used to find the admin login page of a website.☆16Jan 15, 2021Updated 5 years ago
- MEMEX Weapons Pilot for the illegal weapons domain.☆15May 20, 2016Updated 9 years ago
- A collection of useful scripts to prepare a new windows installation for use☆20Jun 18, 2024Updated last year
- Image recon is a tool used to find the social media accounts associated with the uploading image.☆19Dec 18, 2020Updated 5 years ago
- Python RAT with reverse connection and asymmetric encrypted communications☆16Jun 30, 2020Updated 5 years ago
- Jog controller for Expatria CNC Controller boards☆19Feb 21, 2026Updated last week
- This is a python implementation of cell phone tracking using based on the assigned phone number from the service provider and geo-locatio…☆13May 31, 2022Updated 3 years ago
- This is an sms ddoser or sms bomber but better then that nooby nigga Speedx's (TattiBomb=TBOMB) I am working on international bomber..so …☆14Sep 22, 2020Updated 5 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆17Dec 23, 2021Updated 4 years ago
- A Domain-Recon Automated Tool.☆15Feb 8, 2023Updated 3 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Mar 5, 2020Updated 6 years ago