28 Components & Libraries
Sortby
Though Fail2Ban is able to reduce the rate of incorrect authentication attempts, it cannot eliminate the risk presented by weak authentication. Set up services to use only two factor, or public/priva…
BibTeX entry: Copyright 2018 the NiftyNet Consortium.
Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security thro…
Thus, you may use this library to improve your dataset quality: To run experiment follow these steps: To determine the best sampling strategy, ROC AUC scores of each dataset were scaled (min-max scal…
Download the code from GitHub: Install the requirements: Crop the images in each subfolder: Train Blending GAN: Training Curve Visual Result Requirements Train unsupervised Blending GAN: Samples afte…
If that doesn't work, you can try: You don't need to choose a particular one when decrypting a file, it will be selected automatically from the folder. [0] Existing key [1] New key
An easy to use Aries agent for building SSI services using any language that supports sending/receiving HTTP requests. To use ACA-Py you create a business logic controller that "talks to" an ACA-Py i…
Note: These Self prepared Interview Questions will be updated weekly.
This is the code for our cs231n project. We investigated the problem of image super-resolution (SR), where we want to reconstruct high-resolution images from low-resolution images. We presented a res…
It is an extension module of Python which is mostly written in "C". It provides various functions which are capable of performing the numeric computations with a high speed. NumPy provides various po…
PyTorch-based Super-Resolution and Restoration Image Processing Module for VapourSynth.
This script will hide files inside images and save the modified image to disk The maximum size of file which can be hidden inside an image depends on the dimension of the image. '100k words.txt' is h…
Chaya is for your privacy. Chaya is backed by research (I will publish public version whitepaper on xerohack.com), and has proven to be by far the most effective image steganography tool as compared …
A python steganography module to store messages or files protected with AES-256 encryption inside an image. Steganography is the art of concealing information within different types of media objects …
My Projects, Kaggle Competitions and implementation of some popularly known machine learning algorithms. I have also included a list of research papers I have curated in the feild of ML/DL/AI. Follow…
A program for encoding information in image and audio files through steganography. Any type of data can be encoded, from raw strings to files, as shown below: On the left, a house with a steganograph…
See below how medigan can be run from the command line to generate synthetic medical images. Model information can be found in: To install the current release, simply run: Or, alternatively via conda…
Feel free to fork the project and create a pull request with new features or refactoring of the code. Also feel free to make issues with problems or suggestions to new features. OBS: If you d…
Similarly, please consider citing any of the methods and/or resources implemented in liana, that were particularly relevant for your research!
Best tool to analyse PNG files, it shows you PNG chunks : header, palette, and text. PngParser(file) file: str or file type PngParser.get_image_data() PngParser.set_image_data() PngParser.get_chunk_b…
Kizagan is a RAT,C2 tool built with python.Kizagan can build executables and control infected machines. Basic file/directory commands.(rename, delete, create etc.) Download/Upload files. Execute shel…
GSoC: Google Summer of Code; 'Oscar of the Coding World', as they popularly call it; has immense mystique surrounding it.Nurturing this dream, as many aspirants step in here, analyzing the right orga…
If you find my research useful, please use the following to cite: As it can be seen, the generated images do not suffer from mode collapse. Illustration of Conditional Wasserstein Progressive Growing…
File Hider is a sophisticated tool that allows you to securely hide and encrypt a file within another file using multiple layers of AES-256 encryption, with the AES key itself being encrypted using R…
Subscribe to our newsletter