Sologala / pyStagView external linksLinks
This is a simple python binding of Stag Fiducial Marker Detection System
☆12Mar 7, 2022Updated 3 years ago
Alternatives and similar repositories for pyStag
Users that are interested in pyStag are comparing it to the libraries listed below
Sorting:
- TUM - 3D Scanning and Motion Capture class final project: Voxel Carving of 3D Surfaces with AR Markers for Pose Estimation☆12Jun 17, 2021Updated 4 years ago
- STag: A Stable Fiducial Marker System☆217Dec 14, 2023Updated 2 years ago
- Advanced malware sandbox evasion using C☆17Jan 23, 2026Updated 3 weeks ago
- 🏠 Homebridge plugin for SmartRent installations☆11Jul 17, 2023Updated 2 years ago
- A faithful transposition of the key features/functionality of @itm4n's PPLDump project as a BOF.☆15Oct 31, 2022Updated 3 years ago
- A Python Module to parse LeCroy Binary Trace Files☆13Oct 20, 2023Updated 2 years ago
- Spider and analyze vaadin applications with OWASP ZAP - the app mediates between the two.☆11Nov 24, 2022Updated 3 years ago
- Risk Lab Research - ESG Company Ranking Score☆11May 1, 2020Updated 5 years ago
- RACF Database Parser☆11Apr 4, 2024Updated last year
- Enable EFS service as low priv user (PE & BOF)☆21Jul 6, 2025Updated 7 months ago
- Just a git repo for the sleepmask detection rule i found in https://codex-7.gitbook.io/codexs-terminal-window/blue-team/detecting-cobalt-…☆16Jun 4, 2025Updated 8 months ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 3 years ago
- Kill AMSI in a remote process PoC☆10Aug 18, 2018Updated 7 years ago
- HTB Jail Remote Exploit By Cneeliz - 2017☆15Jan 9, 2018Updated 8 years ago
- Cross-platform game on Unity2D☆10Nov 9, 2022Updated 3 years ago
- ☆13Oct 29, 2024Updated last year
- Agressor script for Cobalt Strike to mark users as owned in bloodhound from the Cobalt Strike credentials tab.☆12Dec 21, 2019Updated 6 years ago
- Compiled Binaries for Sharp Suite☆15Dec 28, 2019Updated 6 years ago
- Implementation "Intra-Inter Domain Similarity for Unsupervised Person Re-Identification" in pytorch (TPAMI2022)☆11Sep 22, 2022Updated 3 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- Python crawler for remote Windows shares☆12Nov 29, 2015Updated 10 years ago
- Communicate with Vision Research Phantom® cameras with python☆10Jun 23, 2023Updated 2 years ago
- collection of beacon object file (Cobalt strike)☆12Jan 21, 2023Updated 3 years ago
- ☆12Sep 18, 2015Updated 10 years ago
- Low-level HTTP/2 client implementation for experimenting with the protocol.☆11Jul 26, 2020Updated 5 years ago
- Azure Offensive Library☆17Oct 18, 2025Updated 3 months ago
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- Go module that returns supported regions for a service or supported services for a region☆18Dec 12, 2025Updated 2 months ago
- halcon的DeepLearning的分类、目标、缺陷检测☆13May 31, 2021Updated 4 years ago
- ☆10Jun 26, 2024Updated last year
- Rough prototype of Distance Inference using BLE Signal Strength in ESP32☆13Sep 23, 2020Updated 5 years ago
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆14May 28, 2025Updated 8 months ago
- ☆15May 30, 2025Updated 8 months ago
- A Neat Litho-Resist Simulator☆22Oct 13, 2025Updated 4 months ago
- ImageWidget Based on Qt☆10Jun 20, 2021Updated 4 years ago
- A detailed list of potentially dangerous file extensions☆17Jun 18, 2025Updated 7 months ago
- Periodically check hashcat cracking progress and notify of success.☆10Dec 18, 2018Updated 7 years ago
- Scripts aiding penetration testing of Splunk Enterprise systems☆10Jan 29, 2019Updated 7 years ago
- Collection of tools related to 7z, stego, and CTFs☆14Oct 9, 2020Updated 5 years ago