30 Components & Libraries
Sortby
Though Fail2Ban is able to reduce the rate of incorrect authentication attempts, it cannot eliminate the risk presented by weak authentication. Set up services to use only two factor, or public/priva…
django-organizations should be backend agnostic: Etc. The basic functionality should not need much extending. Current dev priorities for me and contributors should include: Please use the project's i…
Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security thro…
MLP for mnist done test on 102flowers done command like this: test on MLP model on mnist done In folder finetuning, we use tf.slim to finetuning the pretrain model (I use the same method in my porn d…
Download the code from GitHub: Install the requirements: Crop the images in each subfolder: Train Blending GAN: Training Curve Visual Result Requirements Train unsupervised Blending GAN: Samples afte…
My Projects, Kaggle Competitions and implementation of some popularly known machine learning algorithms. I have also included a list of research papers I have curated in the feild of ML/DL/AI. Follow…
BibTeX entry: Copyright 2018 the NiftyNet Consortium.
If you find my research useful, please use the following to cite: As it can be seen, the generated images do not suffer from mode collapse. Illustration of Conditional Wasserstein Progressive Growing…
A python steganography module to store messages or files protected with AES-256 encryption inside an image. Steganography is the art of concealing information within different types of media objects …
This is the code for our cs231n project. We investigated the problem of image super-resolution (SR), where we want to reconstruct high-resolution images from low-resolution images. We presented a res…
A program for encoding information in image and audio files through steganography. Any type of data can be encoded, from raw strings to files, as shown below: On the left, a house with a steganograph…
Best tool to analyse PNG files, it shows you PNG chunks : header, palette, and text. PngParser(file) file: str or file type PngParser.get_image_data() PngParser.set_image_data() PngParser.get_chunk_b…
An easy to use Aries agent for building SSI services using any language that supports sending/receiving HTTP requests. To use ACA-Py you create a business logic controller that "talks to" an ACA-Py i…
PyTorch-based Super-Resolution and Restoration Image Processing Module for VapourSynth.
Thus, you may use this library to improve your dataset quality: To run experiment follow these steps: To determine the best sampling strategy, ROC AUC scores of each dataset were scaled (min-max scal…
This script will hide files inside images and save the modified image to disk The maximum size of file which can be hidden inside an image depends on the dimension of the image. '100k words.txt' is h…
Feel free to fork the project and create a pull request with new features or refactoring of the code. Also feel free to make issues with problems or suggestions to new features. OBS: If you d…
Note: These Self prepared Interview Questions will be updated weekly.
GSoC: Google Summer of Code; 'Oscar of the Coding World', as they popularly call it; has immense mystique surrounding it.Nurturing this dream, as many aspirants step in here, analyzing the right orga…
See below how medigan can be run from the command line to generate synthetic medical images. Model information can be found in: To install the current release, simply run: Or, alternatively via conda…
It is an extension module of Python which is mostly written in "C". It provides various functions which are capable of performing the numeric computations with a high speed. NumPy provides various po…
Chaya is for your privacy. Chaya is backed by research (I will publish public version whitepaper on xerohack.com), and has proven to be by far the most effective image steganography tool as compared …
Kizagan is a RAT,C2 tool built with python.Kizagan can build executables and control infected machines. Basic file/directory commands.(rename, delete, create etc.) Download/Upload files. Execute shel…
Similarly, please consider citing any of the methods and/or resources implemented in liana, that were particularly relevant for your research!
Subscribe to our newsletter