The "Football Match Analyzer" project leverages advanced computer vision techniques to analyze football matches. Using the YOLO (You Only Look Once) object detection model, it accurately tracks players, referees, and the football. Key features include team identification, ball control measurement, and player movement analysis.
☆29May 20, 2024Updated last year
Alternatives and similar repositories for Football-Analysis-System
Users that are interested in Football-Analysis-System are comparing it to the libraries listed below
Sorting:
- ☆10Oct 9, 2024Updated last year
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- ☆12Sep 20, 2020Updated 5 years ago
- ☆12Oct 9, 2022Updated 3 years ago
- A library for quickly and easily encrypting strings and text file content.☆12Jul 1, 2021Updated 4 years ago
- ☆12Jul 2, 2023Updated 2 years ago
- ☆15Aug 17, 2023Updated 2 years ago
- ☆12Jun 22, 2022Updated 3 years ago
- Released alongside with a talk at REcon 2023, TheRestarter is an interactive command-line tool is designed to interact with the Windows …☆15Jun 8, 2023Updated 2 years ago
- A simple example on how to initiate a direct syscall on WoW64☆12Feb 2, 2018Updated 8 years ago
- A not-at-all-ordered compilation of random security-related powershell scripts :-)☆12Feb 24, 2022Updated 4 years ago
- Stub for polymorphic code☆11Mar 18, 2023Updated 2 years ago
- ☆10Jun 11, 2022Updated 3 years ago
- Audit and pentest methodologies for Windows including internal enumeration, privesc, lateral movement, etc.☆17Aug 24, 2025Updated 6 months ago
- C# exfiltration tool☆13Sep 24, 2021Updated 4 years ago
- A stealthy, fast and easy tool to spray Active Directory credentials and bypass AD credential spraying controls.☆13Oct 13, 2022Updated 3 years ago
- ☆12Jun 27, 2019Updated 6 years ago
- ☆12Nov 22, 2024Updated last year
- Here I store my proof of concepts☆14Sep 6, 2024Updated last year
- Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty…☆14Feb 6, 2022Updated 4 years ago
- Research of modifying exported function names at runtime (C/C++, Windows)☆18May 28, 2024Updated last year
- Training scenarios for cyber ranges☆15Apr 24, 2020Updated 5 years ago
- CVE-2024-30056 Microsoft Edge (Chromium-based) Information Disclosure Vulnerability☆17May 27, 2024Updated last year
- C2Matrix Automation☆15Sep 10, 2023Updated 2 years ago
- Exploring different process injection techniques based on malware analysis☆14Dec 28, 2023Updated 2 years ago
- My experiments in weaponizing Nim (https://nim-lang.org/)☆14Nov 30, 2021Updated 4 years ago
- Tutorial covering how to discover DLLs for Hijacking and how to create proxy DLLS using Microsoft Teams as an example☆16Apr 7, 2021Updated 4 years ago
- Hide the TCP Connection☆22Mar 24, 2023Updated 2 years ago
- php7.4.26-internalog☆13Oct 13, 2022Updated 3 years ago
- Introducing the Ransomware Builder – an educational tool with a sleek, modern GUI that makes it easy for anyone to create their own ranso…☆18Aug 4, 2024Updated last year
- POC for a basic C2 server using the python aiohttp framework☆15Mar 22, 2020Updated 5 years ago
- pH4Marketplace is a Fiverr Clone marketplace website build with Django (and Bootstrap for the frontend)☆11Oct 21, 2019Updated 6 years ago
- ☆15Dec 12, 2023Updated 2 years ago
- Slides and materials for conference presentations☆11Jun 4, 2023Updated 2 years ago
- Windbg extension port for rp++ is a fast C++ ROP gadget finder for PE/ELF/Mach-O x86/x64/ARM/ARM64 binaries.☆13Sep 8, 2023Updated 2 years ago
- Golang C2 and Beacon/Agent built from the ground up for scalability and expandability☆14Mar 16, 2021Updated 4 years ago
- The following repo holds all scripts, apps, and documentation for InfoSec Red Team related activities.☆19Jun 24, 2020Updated 5 years ago
- Simple Shellcode Runner in Rust Language☆18Dec 8, 2023Updated 2 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Dec 6, 2020Updated 5 years ago