Deep-Live-Cam and Deep-Live-Cam-User-Face

The second is a fork of the first that weaponizes its real-time face-swapping capability specifically for circumventing biometric authentication systems, transforming a general deepfake tool into a targeted attack vector.

Deep-Live-Cam
68
Established
Maintenance 20/25
Adoption 10/25
Maturity 16/25
Community 22/25
Maintenance 10/25
Adoption 5/25
Maturity 11/25
Community 17/25
Stars: 79,998
Forks: 11,666
Downloads:
Commits (30d): 29
Language: Python
License: AGPL-3.0
Stars: 12
Forks: 11
Downloads:
Commits (30d): 0
Language: C#
License: MIT
No Package No Dependents
No Package No Dependents

About Deep-Live-Cam

hacksider/Deep-Live-Cam

real time face swap and one-click video deepfake with only a single image

This tool helps content creators, marketers, and live streamers quickly transform video footage or live camera feeds by swapping faces in real-time. You provide a single image of the face you want to use, and it applies that face onto subjects in your video, allowing you to create new characters or humorous content instantly. It's designed for anyone creating engaging visual media, from memes to live performances, who wants to alter identities without complex editing.

video-editing content-creation live-streaming digital-art social-media

About Deep-Live-Cam-User-Face

Stelteryz/Deep-Live-Cam-User-Face

Uses deepfake technology to bypass ID checks and 2FA by simulating a users face in realtime during live webcam verification, tricking biometric systems into granting unauthorized access through realistic facial mimicry. machine-learning, webcam, faceswap, artificial-intelligence, deepfake, 2fa-bypass, identity-theft, spoofing

This tool generates realistic live webcam feeds using a chosen face, complete with blinking and head movements. It takes a target face as input and outputs a high-resolution, emulated live stream that mimics a real person's presence. Security analysts and developers can use this to test and audit the robustness of facial recognition systems and two-factor authentication (2FA) ID verification.

security-auditing biometric-testing identity-verification access-control penetration-testing

Scores updated daily from GitHub, PyPI, and npm data. How scores work