The "Football Match Analyzer" project leverages advanced computer vision techniques to analyze football matches. Using the YOLO (You Only Look Once) object detection model, it accurately tracks players, referees, and the football. Key features include team identification, ball control measurement, and player movement analysis.
☆30May 20, 2024Updated last year
Alternatives and similar repositories for Football-Analysis-System
Users that are interested in Football-Analysis-System are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- ☆15Aug 17, 2023Updated 2 years ago
- Released alongside with a talk at REcon 2023, TheRestarter is an interactive command-line tool is designed to interact with the Windows …☆15Jun 8, 2023Updated 2 years ago
- ☆12Jul 2, 2023Updated 2 years ago
- Code and notes regarding Malware Development☆11Oct 30, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆12Jun 22, 2022Updated 3 years ago
- ☆12Oct 9, 2022Updated 3 years ago
- ☆12Sep 20, 2020Updated 5 years ago
- ☆10Oct 9, 2024Updated last year
- Stub for polymorphic code☆11Mar 18, 2023Updated 3 years ago
- C# exfiltration tool☆13Sep 24, 2021Updated 4 years ago
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆19Oct 8, 2020Updated 5 years ago
- Research of modifying exported function names at runtime (C/C++, Windows)☆18May 28, 2024Updated last year
- Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty…☆14Feb 6, 2022Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆10Jun 11, 2022Updated 3 years ago
- Here I store my proof of concepts☆15Sep 6, 2024Updated last year
- CVE-2024-30056 Microsoft Edge (Chromium-based) Information Disclosure Vulnerability☆17May 27, 2024Updated last year
- Beacon Object Files used for Cobalt Strike☆19Jul 18, 2023Updated 2 years ago
- A library for quickly and easily encrypting strings and text file content.☆12Jul 1, 2021Updated 4 years ago
- Golang C2 and Beacon/Agent built from the ground up for scalability and expandability☆14Mar 16, 2021Updated 5 years ago
- ☆12Jun 27, 2019Updated 6 years ago
- Training scenarios for cyber ranges☆15Apr 24, 2020Updated 6 years ago
- A simple example on how to initiate a direct syscall on WoW64☆12Feb 2, 2018Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Simple Shellcode Runner in Rust Language☆18Dec 8, 2023Updated 2 years ago
- C2Matrix Automation☆15Sep 10, 2023Updated 2 years ago
- ☆12Nov 22, 2024Updated last year
- ☆20Mar 21, 2024Updated 2 years ago
- php7.4.26-internalog☆13Oct 13, 2022Updated 3 years ago
- Ntdll Unhooking POC☆19Aug 12, 2022Updated 3 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Dec 6, 2020Updated 5 years ago
- Exploring different process injection techniques based on malware analysis☆14Dec 28, 2023Updated 2 years ago
- Repo for all the Recon and enum techniques, Exploitation, Priv-escalation (Linux and Windows), post exploitation☆16Sep 8, 2025Updated 7 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Audit and pentest methodologies for Windows including internal enumeration, privesc, lateral movement, etc.☆19Mar 31, 2026Updated last month
- POC for a basic C2 server using the python aiohttp framework☆15Mar 22, 2020Updated 6 years ago
- Slides and materials for conference presentations☆11Jun 4, 2023Updated 2 years ago
- Tutorial covering how to discover DLLs for Hijacking and how to create proxy DLLS using Microsoft Teams as an example☆16Apr 7, 2021Updated 5 years ago
- Windbg extension port for rp++ is a fast C++ ROP gadget finder for PE/ELF/Mach-O x86/x64/ARM/ARM64 binaries.☆13Sep 8, 2023Updated 2 years ago
- A mechanism that trampoline hooks functions in x86/x64 systems.☆21Oct 9, 2024Updated last year
- PoC showing how a potentially malicious script could be hidden, encrypted, into invisible unicode characters☆15May 26, 2019Updated 6 years ago