Showing 9 open source projects for "open source faceswap"

View related business solutions
  • Automate contact and company data extraction Icon
    Automate contact and company data extraction

    Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.

    Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
    Explore Apify Store
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Learn More
  • 1
    A multi-user text based (via telnet) server application for the card game UNO.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2

    Servidores-DCS

    Servidores

    Los Mejores Servidores De Cs
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    gmodes
    Examples how to make basic and clever addons and gamemodes using GarrysMod. Also in our svn repository there is a list of stuff maded by members of gmodspain.com. Those files enable future improvement and modifications for lua coders.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    SimProject is a simulation game which involves project management.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Create and run cloud-based virtual machines. Icon
    Create and run cloud-based virtual machines.

    Secure and customizable compute service that lets you create and run virtual machines.

    Computing infrastructure in predefined or custom machine sizes to accelerate your cloud transformation. General purpose (E2, N1, N2, N2D) machines provide a good balance of price and performance. Compute optimized (C2) machines offer high-end vCPU performance for compute-intensive workloads. Memory optimized (M2) machines offer the highest memory and are great for in-memory databases. Accelerator optimized (A2) machines are based on the A100 GPU, for very demanding applications.
    Try for free
  • 5
    A network-based multiplayer chess-like game.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    PresbyterySite is a suite of Joomla! components that simplify producing an excellent Presbytery website, and streamline the tasks of the clerk. Currently it provides a Google map of congregations, and a directory of congregations & committees.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Undead Infestation is an epic adventure RPG set in the city of Mearal. Your task is to find out where your wife and son are, where all the undead that are haunting the streets are coming from and why a lot of the cities inhabitants have disappeared.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Wii Media Center is a php-based media center for the Nintendo Wii. Running on a web server on a computer, it can stream music, videos and pictures to the internet channel by the WiFi connection.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    Pokemon ROMS

    Modified Pokemon games for emulators or devices.

    Pokemon ROMs are modified versions of Pokemon video games that can be played on emulators or compatible devices. These ROMs enable players to enjoy classic Pokemon titles with added features or enhancements, often created by fans. However, it's crucial to acknowledge that downloading and using Pokemon ROMs without owning the original game cartridge may infringe on copyright laws, so users should be aware of the legal implications associated with their use.
    Downloads: 0 This Week
    Last Update:
    See Project
  • SIEM | API Security | Log Management Software Icon
    SIEM | API Security | Log Management Software

    AI-Powered Security and IT Operations Without Compromise.

    Built on the Graylog Platform, Graylog Security is the industry’s best-of-breed threat detection, investigation, and response (TDIR) solution. It simplifies analysts’ day-to-day cybersecurity activities with an unmatched workflow and user experience while simultaneously providing short- and long-term budget flexibility in the form of low total cost of ownership (TCO) that CISOs covet. With Graylog Security, security analysts can:
    Learn More
  • Previous
  • You're on page 1
  • Next