51 Components & Libraries
Sortby
The code contains the implementation of a method for the automatic classification of electrocardiograms (ECG) based on the combination of multiple Support Vector Machines (SVMs). The method relies on…
ninfs (formerly fuse-3ds) is a FUSE program to extract data from Nintendo game consoles. It works by presenting a virtual filesystem with the contents of your games, NAND, or SD card contents, and yo…
With this script you will be able to clone many 12-24 PB keys. I will support this project as far as I can, but issues and pull requests are always welcome! This project licensed under MIT License. Y…
OpenAI-Forward 提供如下功能: 与OpenAI完全一致 服务地址 开启缓存服务地址(用户请求结果将被保存一段时间) (更多) (更多) 注意:如果你设置了 OPENAI_API_KEY 但未设置 FORWARD_KEY,客户端在调用时将不需要提供密钥。由于这可能存在安全风险,除非有明确需求,否则不推荐将 FORWARD_KEY 置空。 缓存默认使用内存后端,可选择数据库后端,需安装…
A tool (and pre-commit hook) to automatically add trailing commas to calls and literals. This has the following benefits: arbitrary indentation is avoided:
The SpyPi is a white-hat hacking-station I've created as part of my high school graduation-work (2017). The device aims at raising awareness of data protection by letting people interactively get in …
SSL stripping is NOT provided by this project.
An example section that can be placed into one of these files: When the same option is passed on the command line and also via configuration files the following strategies are applied to resolve thes…
Checkout our comprehensive documentation complete with tutorials, guides, and example quickstart deployments.
Remote files are automatically downloaded and cached if possible. or Then run, as in
Signup for an account. If you can spare some money, then buy the premium version. Else, the free version will suffice.
Presentation Material and Sample Code from the Blockchain and Machine Learning Workshop at START Summit 2017 in Switzerland The purpose of this code is to demonstrate in a simple example, how to brin…
Blurs faces in video. Make sure you have Python version 3.10.6 or greater installed Download the tool's repository using the command: Move to the tool's directory and install the tool Example
This Python script logs in to server.growatt.com and retrieves data on solar panels. Currently this package uses an API that I reverse engineered the API from the Growatt mobile app. This is more of …
Additional options for attacks (e.g. DNS poisoning) and post-exploitation will be added in the future. This tool is currently divided into four packages: Any of these packages can be extended with ne…
And then: If our script saved your time or money, you may:
Email is a challenge to visualize. The Newman tool and accompanying analytics contain a processing component, email analytics, visualization and discovery tools. Newman can quickly analyze and explor…
Hunt Crack and Hacked Private Key Bitcoin Wallet With SmitBlock in Python and Node. for use , first install package's with : install package's on Linux :
DrMITM is a program designed to globally log all traffic. DrMITM sends a request to website and returns the IP of the website just in case the server of the website is designed to rely on the website…
You can install this Library with:
If our application saved your time or money, you may:
Subscribe to our newsletter