An application for detection and classification of new indian currency notes using bag of visual words and random forest
☆19Oct 24, 2019Updated 6 years ago
Alternatives and similar repositories for indian-currency-classification
Users that are interested in indian-currency-classification are comparing it to the libraries listed below
Sorting:
- Python client for IP to ASN lookup services☆12Feb 21, 2026Updated 2 weeks ago
- A repo for output of an intrusion prediction project☆11Feb 28, 2026Updated last week
- EDU token contract that powers the OS.University Network☆11May 26, 2018Updated 7 years ago
- Weaponize.it is your go-to resource for gaining insights into pentesting, bug bounty hunting, and scripting.☆12Apr 3, 2025Updated 11 months ago
- Daily scrapes of trends from Wikipedia, Google and Twitter☆11May 15, 2023Updated 2 years ago
- Another Vulnerability Auditor - Community Edition☆13Jun 1, 2021Updated 4 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆12Jul 2, 2021Updated 4 years ago
- A (massive) DNS tools (reverse lookup for now)☆12Jul 6, 2022Updated 3 years ago
- ☆11May 13, 2024Updated last year
- Simple tools to handle string and generate subdomain permutations☆15Jun 8, 2022Updated 3 years ago
- Disassembly Generation and Processing for JARV1S☆15Jul 15, 2025Updated 7 months ago
- Exploit for CVE-2021-27342 vulnerability (telnet authentication brute-force protection bypass)☆14May 15, 2021Updated 4 years ago
- Automated compromise detection of the world's most popular packages☆16Sep 25, 2023Updated 2 years ago
- AtlassianConfluence-RCE批量检测工具☆12Oct 11, 2024Updated last year
- ☆14Feb 25, 2025Updated last year
- The Jolly Executioner - a simple command execution proxy☆16Jun 9, 2024Updated last year
- ☆13Mar 15, 2022Updated 3 years ago
- Signatures for wraith used to detect secrets across various sources☆15Jul 8, 2022Updated 3 years ago
- A tool to generate datasets and models based on vulnerabilities descriptions from @Vulnerability-Lookup.☆23Updated this week
- ☆17Updated this week
- MG community edition is an open source pentesting tool to generate payloads for HID attacks.☆18Jan 3, 2018Updated 8 years ago
- ☆16Mar 29, 2024Updated last year
- using the Elliptic Data Set (https://www.kaggle.com/ellipticco/elliptic-data-set) and working to improve on the orignals results by Weber…☆15Jul 13, 2024Updated last year
- ☆12Jan 4, 2022Updated 4 years ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆11Jun 14, 2019Updated 6 years ago
- Quick Repo for any Bug Hunter☆15May 19, 2021Updated 4 years ago
- Methodology for "The Disappearance of Quitobaquito Springs: Tracking Hydrologic Change with Google Earth Engine," published on October 1,…☆14Sep 24, 2020Updated 5 years ago
- PoC of CVE-2022-22978 vulnerability in Spring Security framework☆12Jun 4, 2022Updated 3 years ago
- the puppy proxy☆22May 19, 2020Updated 5 years ago
- This Project uses a Panda board mounted on top of my drone (the attacker) to hijack other drones autonomously and fly them back to the st…☆16May 20, 2014Updated 11 years ago
- CVE-2022-1040☆17Sep 25, 2022Updated 3 years ago
- This repository stores the proof-of-concept of Windows malware categorized with MITRE ATT&CK.☆14Nov 8, 2024Updated last year
- Scans the typos of candidate election pages for typosquatters☆18Oct 25, 2018Updated 7 years ago
- Turning Your Computer Into a GPS Tracker With Apple Maps☆18Feb 6, 2024Updated 2 years ago
- Chase subdomains by parsing the results of Google and Yandex search results☆15Sep 29, 2023Updated 2 years ago
- Python framework for manipulating bulk WHOIS data from RIRs☆22Jan 8, 2026Updated 2 months ago
- The unofficial API of barchart.com☆18May 14, 2021Updated 4 years ago
- Anti-VM, malware sandbox detection and evasion.☆14Jun 13, 2022Updated 3 years ago
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆18Dec 6, 2024Updated last year