Automatically locate your eyeglass areas in video streams and apply Gaussian filters to blur it.
☆27Dec 5, 2022Updated 3 years ago
Alternatives and similar repositories for EyeglassFilter
Users that are interested in EyeglassFilter are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Small keyboard designs for folks who cannot use 'traditional' keyboard designs. These designs are focused on running the artsey.io keybo…☆17Feb 14, 2022Updated 4 years ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆12Apr 16, 2020Updated 5 years ago
- Examples for the FORM+CODE book☆20Oct 2, 2015Updated 10 years ago
- Automated testing of SMTP servers for penetration testing☆14Oct 23, 2025Updated 5 months ago
- WireGuard client for PacketFence ZTNA☆11Apr 26, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Red Team Projects with chat.openai.com.☆17Apr 3, 2023Updated 2 years ago
- ☆32Aug 1, 2024Updated last year
- Tool to crawl, visualize and interact with SQL server links in a d3 graph to help in your red/blue/purple/.../risk assessments pentest …☆19Sep 18, 2020Updated 5 years ago
- Your Open-Source SOC Assistant☆12Apr 5, 2023Updated 2 years ago
- Proof of concept exploit for Ivanti EPM CVE-2024-13159 and others☆13Feb 19, 2025Updated last year
- IntelOwl's Web Interface. Built with Angular 10.☆86Sep 8, 2022Updated 3 years ago
- Zero Trust Network Framework☆10Sep 29, 2019Updated 6 years ago
- Oracle Attacks Tool☆13Aug 9, 2016Updated 9 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Jan 14, 2021Updated 5 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Alternative approach to interfacing RtMidi lib in Cinder☆21Jan 22, 2026Updated 2 months ago
- This script is written in Solidity and Python3, it allows you to sell Honeypot tokens despite broken TransferFrom function.☆13Jan 28, 2022Updated 4 years ago
- Ruby gem to check to see if an email address is on http://haveibeenpwned.com☆17Oct 26, 2017Updated 8 years ago
- Bitcoin address changer. It changes the clipboard depending of the pubkey.☆10Sep 12, 2021Updated 4 years ago
- Wiki for all stuff Mediatek SoC hacking☆12Nov 3, 2017Updated 8 years ago
- Workflow for pentesting web applications.☆21Feb 19, 2019Updated 7 years ago
- Modulo's Open Distributed SCAP Infrastructure Collector, or modSIC, makes it easier for security analysts to scan an environment vulnerab…☆15Jun 23, 2017Updated 8 years ago
- Create Synchronicity is an easy, fast and powerful backup application. It synchronizes files & folders, has a neat interface, and can sch…☆12Jun 5, 2011Updated 14 years ago
- A Credit Card Payment System - CCPS build with react, typescript, bootstrap, sass, react-transition, font-awesome☆11Mar 25, 2022Updated 4 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- RID Hijacking Proof of Concept script by Kevin Joyce☆15Oct 30, 2018Updated 7 years ago
- Confluence Hardcoded Password POC☆15Jul 30, 2022Updated 3 years ago
- SIMPLE ESP32 SOFTWARE OVERCLOCK EXPERIMENT☆16Oct 20, 2021Updated 4 years ago
- Automatic cloud backup of Kali Linux data☆13Feb 27, 2020Updated 6 years ago
- IEC104 Client for Metasploit☆11Aug 6, 2018Updated 7 years ago
- Higher-level Python interface for frida☆23Jul 7, 2025Updated 8 months ago
- Intruder.py - A powerful tool to customize attacks on websites. Has 4 different options of attacks☆12Dec 1, 2020Updated 5 years ago
- A simple armv4 emulator with embedded freertos and linux operating system support, Demo:☆13Sep 12, 2021Updated 4 years ago
- A list of all known CoDeSys PLCs, along with notes regarding what version, what protocols and ports are used on each.☆14May 5, 2023Updated 2 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Manages tweets about food poisoning in Chicago and presents Open311 form for reporting incidents.☆29Jan 25, 2017Updated 9 years ago
- A collection of phishing techniques used to evade detection. #nolockdown☆23Aug 28, 2025Updated 6 months ago
- This is the code bundle of Penetration Testing with Raspberry Pi, Second-Edition book☆10Jan 14, 2021Updated 5 years ago
- Presentation Slides and Resources☆16Jun 12, 2024Updated last year
- My own custom payloads for any BAD USB. (These payloads work perfectly with Arduino, Pi Pico, & Rubber Ducky.☆13Jan 19, 2023Updated 3 years ago
- ☆16Dec 4, 2023Updated 2 years ago
- Full disassembled source code of the iconic C64 intro from Fairlight.☆17May 9, 2021Updated 4 years ago