Contains various python programs and proof of concept.
☆10Nov 30, 2015Updated 10 years ago
Alternatives and similar repositories for Python-programs
Users that are interested in Python-programs are comparing it to the libraries listed below
Sorting:
- Orchestrate actions in homegrown and third-party apps in minutes☆12Feb 20, 2026Updated last week
- IME-USP MAC5768 Project - Computer Vision and Image Processing - Bank notes recognition☆11Jul 5, 2013Updated 12 years ago
- e-Democracia source code. http://edemocracia.camara.leg.br/ See our plans for the future on Trello: https://trello.com/b/Wzi39aNt/e-democ…☆10Feb 27, 2018Updated 8 years ago
- Google Tink's critical Ed25519 bug related to Java "final" keyword☆11Apr 5, 2020Updated 5 years ago
- DSLs for modeling and analyzing farming systems☆12May 4, 2017Updated 8 years ago
- Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resou…☆10Dec 3, 2020Updated 5 years ago
- A Pretty Printer, based on Philip Wadler's "A prettier printer". But heavily modified to be efficient in a strict language.☆19Mar 20, 2021Updated 4 years ago
- Simple Snake game using OpenGL C++, including a discrete snake robot model for producing real snakelike movements.☆10Dec 7, 2022Updated 3 years ago
- Uptime checker for tor hidden services☆12Feb 14, 2018Updated 8 years ago
- Modification of SOMPY repo with robust K-means clustering (bootstrapped SSE elbow method)☆13Apr 6, 2019Updated 6 years ago
- Lib para gerar remessa CNAB 240☆11Jul 30, 2019Updated 6 years ago
- Utility to control Wiz lightbulbs☆10Aug 16, 2020Updated 5 years ago
- A United States map CTFd theme☆12Aug 28, 2017Updated 8 years ago
- Grupo de Usuários do OpenBSD☆10Oct 17, 2023Updated 2 years ago
- A lightweight python system dashboard written in cherry py delivered over the web.☆10Sep 20, 2022Updated 3 years ago
- Python AIMP remote API wrapper with some extras☆11Dec 18, 2023Updated 2 years ago
- Web Service for Human Pose Annotation☆10Oct 21, 2018Updated 7 years ago
- My basic kubernetes toolkit☆11Dec 24, 2021Updated 4 years ago
- The design and implementation of the Privacy Integrated Queries (PINQ) platform for privacy-preserving data analysis☆11Feb 25, 2017Updated 9 years ago
- Cyber Threat Intelligence Appliance☆13Dec 8, 2022Updated 3 years ago
- Boost binary builds for fast PoF development. Build by GitHub pipelines.☆12Jan 1, 2026Updated last month
- Pi approximation using Monte Carlo Simulation☆21Aug 11, 2014Updated 11 years ago
- An Unofficial LSE LaTeX Beamer Theme☆15Sep 1, 2015Updated 10 years ago
- ☆11Jun 24, 2021Updated 4 years ago
- Create Dashboards via Timelion API or via Import in Kibana 7.x and Elasticsearch 7.x with Python☆10Mar 16, 2021Updated 4 years ago
- This repository contains binaries for the multiple teacher approach to learning differential private ML models: https://arxiv.org/abs/161…☆10Nov 16, 2016Updated 9 years ago
- EDK II☆11May 7, 2024Updated last year
- This project is about applying k-anonymity principle to tables of relational data. Later on, the centralized algorithms will be modified …☆12Feb 12, 2013Updated 13 years ago
- Script which display image (ad) downloaded from the internet.☆13Feb 2, 2020Updated 6 years ago
- Modulo's Open Distributed SCAP Infrastructure Collector, or modSIC, makes it easier for security analysts to scan an environment vulnerab…☆15Jun 23, 2017Updated 8 years ago
- A tool for the automatic generation of Isabelle/HOL correctness proofs for security protocols.☆18Jun 21, 2015Updated 10 years ago
- Repositorio com os arquivos do minicurso de Python ministrado na FURB em Abril/2017☆11Apr 21, 2017Updated 8 years ago
- Python code examples for working with the Slack API. 2.x and 3.x compatible code.☆13May 19, 2016Updated 9 years ago
- Tools to help you get your twitter archive out of twitter☆10Mar 9, 2021Updated 4 years ago
- Examples of different Siamese Neural Networks architectures applied to well-known datasets.☆13Sep 1, 2020Updated 5 years ago
- A tool to download malwares☆16May 22, 2023Updated 2 years ago
- Nessus Vulnerability Scanner in a Docker container☆10Sep 25, 2018Updated 7 years ago
- Damn Vulnerable Web Application (DVWA) Vagrant Box for testing☆14Jun 23, 2016Updated 9 years ago
- ☆13Feb 29, 2020Updated 6 years ago