dot v1.2 releases: The Deepfake Offensive Toolkit
Deepfake Offensive Toolkit
dot (aka Deepfake Offensive Toolkit) makes real-time, controllable deepfakes ready for virtual camera injection. dot is created for performing penetration testing against e.g. identity verification and video conferencing systems, for the use by security analysts, Red Team members, and biometrics researchers.
If you want to learn more about dot is used for penetration tests with deepfakes in the industry, read these articles by The Verge and Biometric Update
dot is developed for research and demonstration purposes. As an end user, you have the responsibility to obey all applicable laws when using this program. Authors and contributing developers assume no liability and are not responsible for any misuse or damage caused by the use of this program.
How it works
In a nutshell, dot works like this
__________________ _____________________________ __________________________
| your webcam feed | -> | suite of realtime deepfakes | -> | virtual camera injection |
—————— —————————– ————————–
All deepfakes supported by dot do not require additional training. They can be used in real-time on the fly on a photo that becomes the target of face impersonation. Supported methods:
- face swap (via SimSwap), at resolutions 224 and 512
- with the option of face superresolution (via GPen) at resolutions 256 and 512
- lower quality face swap (via OpenCV)
- FOMM, First Order Motion Model for image animation
Changelog v1.2
Highlights
- Create a dot executable for windows
- Add a graphical interface for dot
What’s Changed
- Create a dot executable for windows by @Ghassen-Chaabouni in #92
- Add a graphical interface for dot by @Ghassen-Chaabouni in #85
- Update README and CONTRIBUTING by @giorgiop in #40
- Fix config paths in additional scripts under scripts/ folder by @Ghassen-Chaabouni in #43
- Update README and add instructions for running dot with an Android emulator by @Ghassen-Chaabouni in #45
Install & Use
Copyright (c) 2022, Sensity B.V.
All rights reserved.