utkarshmalik211 / Reconstructing-Blurred-Human-Faces
In photographic media, faces are often obfuscated to protect the identity of those pictured. This obfuscation process is done by removing details from the photograph in order to reduce the identifying facial features. However, these obfuscated images may still contain enough details such that the original features may be able to be recovered. In…
☆11Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for Reconstructing-Blurred-Human-Faces
- Get your USB Rubber Ducky up and running faster☆42Updated 6 years ago
- Web Crawler and Scraper☆12Updated 2 years ago
- ReFleX - Deep Image Recognition Bot☆24Updated 4 years ago
- Apple BLE research☆28Updated 4 years ago
- How cool would it be to learn Linux through the man pages To make it even more fun, I made this script with various options and with a co…☆24Updated 2 years ago
- A public IP API service.☆11Updated 5 years ago
- Removes background of a png/jpg image and let's user download the image.☆9Updated last year
- High Quality Images from NASA APOD☆35Updated 5 years ago
- Scrapes Facebook profile pages using a normal login (without an API key)☆31Updated 4 years ago
- Kismet plugin for deauth AP☆10Updated last year
- Users parser for Fetlife website.☆10Updated last year
- Instantly search the web for hacked data. Check if you appear in any database leaks.☆13Updated 5 years ago
- Blackbox tool to disable SSL certificate validation - including certificate pinning - within iOS and OS X Apps☆17Updated 6 years ago
- Tinder user searcher and DB creation. Proof of concept for Tinder security team☆16Updated 5 years ago
- [ Multi Encryption / Decryption ]☆20Updated 4 years ago
- Simple and fast web fuzzer written in python☆10Updated 4 years ago
- Quick utility to craft executables for pentesting and managing reverse shells☆42Updated 5 years ago
- How to steal FaceApp photos☆37Updated 5 years ago
- Control thousands of WS2811/2812 LEDs at video refresh speeds☆13Updated 9 years ago
- Use Invoke-PSImage to deliver a payload in an Image☆52Updated 6 years ago
- Simple password crackers used for salted and unsalted passwords encrypted with MD5, SHA-1, and SHA-256 algorithms.☆15Updated 4 years ago
- Windows Auto Post Exploitation - For ReD Team☆15Updated 5 years ago
- CryptoTrojan in Python (For educational purpose ONLY)☆45Updated 6 years ago
- Python tools for ethical hacking☆36Updated 5 years ago
- Google Hack Database dork automatic tool.☆25Updated 6 years ago
- eVic electronic cigarette firmware decryption and image dumping☆14Updated 9 years ago
- Grab target's webcam shots by link☆20Updated 5 years ago
- A command-line network packet crafting and injection utility☆26Updated 5 years ago