Convert images or videos to ASCII in the terminal
☆25Feb 26, 2021Updated 5 years ago
Alternatives and similar repositories for ascii-py
Users that are interested in ascii-py are comparing it to the libraries listed below
Sorting:
- ☆13Jul 13, 2020Updated 5 years ago
- ☆10Aug 9, 2024Updated last year
- Numerous fork bombs in popular programming langs ...☆10May 25, 2017Updated 8 years ago
- My modern disassemblies of paleolithic (DOS-era) malware!☆13Feb 7, 2026Updated last month
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- Project Title: Using Machine Learning to Understand the Topology of Knots. This repository contains my Project Log and Code.☆10Nov 7, 2018Updated 7 years ago
- ☆11Aug 19, 2025Updated 6 months ago
- Bruteforce logins with python☆11Jul 12, 2022Updated 3 years ago
- Simple microcanonical Molecular Dynamics simulation of a Lennard-Jones fluid in a periodic boundary☆10Jan 2, 2018Updated 8 years ago
- Known WannCrypt Bitcoin addresses☆10Jul 17, 2017Updated 8 years ago
- pour plus de tutos veuillez visiter le site☆11Sep 21, 2020Updated 5 years ago
- CTI-URLScan is a command line tool to enable analysts to search URLscan.io submissions. Pull screenshot and DOM content. As well as, auto…☆10Mar 2, 2021Updated 5 years ago
- Some useful VMD scrpits☆10May 24, 2016Updated 9 years ago
- LAST: Latent Space Assisted Adaptive Sampling for Protein Trajectories☆13Dec 17, 2022Updated 3 years ago
- OMNI-P2x: A universal neural network potential for excited states☆12Feb 26, 2026Updated last week
- Tools for hunting security threats☆12Feb 4, 2020Updated 6 years ago
- javascript botnet browser V3 based one Cloud 9 Botnet and my botnet browser chrome. capture any web site,virtual clavier ,paypal,facebook…☆10Sep 12, 2020Updated 5 years ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Mar 26, 2021Updated 4 years ago
- This is a collection of Viruses and Worms for Malware Researchers it forms a good backbone from malware back in the day to some recent on…☆11Aug 26, 2014Updated 11 years ago
- Modulated automation of cluster expansion based on atomate2 and Jobflow☆12Mar 2, 2026Updated last week
- ☆11Sep 16, 2024Updated last year
- APK Static Analyzer☆10Dec 4, 2015Updated 10 years ago
- Awesome list about AI4Polymer☆18Sep 23, 2025Updated 5 months ago
- cidrgen is based on cidr's subnet IP list generator☆15Aug 21, 2020Updated 5 years ago
- Tools for geometric learning☆12Sep 26, 2025Updated 5 months ago
- Implementation of various equivariant models in JAX☆12Apr 12, 2024Updated last year
- ☆13Feb 11, 2025Updated last year
- Python tools for working with LAMMPS files☆15Jan 5, 2026Updated 2 months ago
- Supplementary scripts for Z1+ users☆16Dec 12, 2025Updated 2 months ago
- Auto-differentiated descriptors using Enzyme☆12Apr 2, 2025Updated 11 months ago
- Examples for pscf (polymer self-consistent field theory)☆10Nov 12, 2021Updated 4 years ago
- NanoOpt: Deriving potentials for coarse-grained nanoparticles via potential-matching☆11Oct 8, 2021Updated 4 years ago
- Take a list of URIs and print all the of the paths☆10Aug 16, 2020Updated 5 years ago
- Benchmark CPUs and GPUs by running molecular dynamics simulations in LAMMPS☆15Oct 25, 2022Updated 3 years ago
- Bottom-up Open-source Coarse-graining Software☆21Aug 9, 2024Updated last year
- Phishing detection regex for Blueteams☆12Dec 27, 2020Updated 5 years ago
- Retro programming in Borland Turbo Assembler☆15Dec 19, 2018Updated 7 years ago
- Dump of the crypto-miner that got installed on my system☆14May 30, 2020Updated 5 years ago
- Secure FTP☆11Jul 28, 2018Updated 7 years ago