jewang / gender-neutral-text-converter
Converts text to be gender neutral.
☆26Updated 7 years ago
Alternatives and similar repositories for gender-neutral-text-converter:
Users that are interested in gender-neutral-text-converter are comparing it to the libraries listed below
- sync a website or local spreadsheet with a google sheet☆35Updated 2 years ago
- Archive of OCR'd tweets from Cesar Sayoc - A.K.A. the "MAGA bomber"☆10Updated 6 years ago
- Code release for: Cookies that give you away: The surveillance implications of web tracking☆53Updated 6 years ago
- An experiment in permeable publishing.☆11Updated 8 years ago
- identifies and tracks known mac addresses on your subnet☆13Updated 8 years ago
- Move the mouse by your webcam + eyes☆21Updated 7 years ago
- Audible Electromagnetic Interference Detector - Model ET-1☆14Updated 5 years ago
- export data from twitter archive and visualize it☆25Updated 2 years ago
- An alternative Computer vision and AI training platform built to play any game on Steam (Linux).☆20Updated 3 years ago
- HTTPLeaks - All possible ways, a website can leak HTTP requests☆15Updated 9 years ago
- A simple bot that open chests for you.☆14Updated 6 years ago
- A curated list of open source tools for archiving audio & video data for offline usage.☆56Updated 7 years ago
- The Blind Public License is a restrictive license that does not allow any person to read, view, interpret, emulate, debug, disassemble, r…☆55Updated 8 years ago
- SAO/Badge for Tor at Defcon 27☆21Updated 5 years ago
- (W|H)all of lame - unencrypted password gathering under open wifi networks☆32Updated 7 years ago
- Building the Peer-to-Peer Internet workshop series☆100Updated 2 years ago
- 🦉 Flock is a privacy-preserving fleet management system powered by osquery and the Elastic Stack☆19Updated 4 years ago
- This tool for crack hash password BLAKE-224 BLAKE-256 BLAKE-512 BLAKE-384 with bruteforce method☆18Updated 7 years ago
- 🌠 Learn how to use IPFS to store data on the ultimate decentralised/distributed file system!☆32Updated 6 years ago
- AI research environment for program generation.☆27Updated last year
- Every document published from the Snowden archive☆68Updated 10 years ago
- :e-mail: A simple Cypherpunk message preprocessor that makes it easy to chain Type I anonymous remailers together.☆35Updated 9 years ago
- Programmatically find and read labels using Machine Learning☆46Updated 6 years ago
- SSH Man In The Middle proxy with credentials interception, asciinema session replay, ...☆23Updated 8 years ago
- a collection of teaching resources☆12Updated 7 years ago
- Signed list of OpenPGP fingerprints for First Look employees☆14Updated 2 months ago
- Proof of concept for converting any content into a domain name.☆310Updated 11 years ago
- ☆49Updated 7 years ago
- Spark MLib Training Models for Network Security☆16Updated 7 years ago
- A monitoring program with sentiment analysis and prioritization.☆13Updated 6 years ago