I train a model using TensorFlow to detect the suit and number of a playing card. I created my own dataset by taking pictures of each card, then performing data augmentation using rotate, zoom, brighten, and shear functions.
☆14Aug 6, 2020Updated 5 years ago
Alternatives and similar repositories for Playing-Cards-Computer-Vision
Users that are interested in Playing-Cards-Computer-Vision are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Caterpillar is a security scanning library for AI agent skill files (e.g., Claude Code skills) for dangerous or malicious behavior☆41Feb 16, 2026Updated last month
- Home of code related to security of network systems.☆25Jan 22, 2025Updated last year
- Safety philosopy: example principles for an organization and management☆13Apr 14, 2025Updated 11 months ago
- A Twitter bot that watches bitcoin wallets tied to the WannaCry ransomware attack☆22May 25, 2017Updated 8 years ago
- Assess certain AWS network configurations☆12Aug 22, 2018Updated 7 years ago
- Solving CAPTCHA with Image Classification☆10Mar 13, 2025Updated last year
- Chat app for Android that supports answers from multiple LLMs at once. Bring your own API key AI client. Supports OpenAI, Anthropic, Goog…☆13Oct 30, 2024Updated last year
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 11 months ago
- A tool to discover bygonessl vulnerabilities using the facebook API☆20Oct 2, 2019Updated 6 years ago
- ☆10Jan 14, 2015Updated 11 years ago
- token exchange as a service☆11Updated this week
- Small Node CLI tool to extract active contributors on repos and orgs☆10Dec 6, 2022Updated 3 years ago
- ☆14Jan 8, 2026Updated 2 months ago
- ☆11Oct 30, 2019Updated 6 years ago
- The ImageMagick Security Policy Evaluator allows developers and security experts to check if an XML Security Policy is hardened against a…☆19Feb 6, 2023Updated 3 years ago
- Kantega Web Application Security Hero Challenge☆19Dec 3, 2020Updated 5 years ago
- ☆18Jul 30, 2024Updated last year
- Host Internal Static Website on AWS☆17Dec 6, 2023Updated 2 years ago
- vBrowser is a secure, containerized browser platform designed for covert web investigations. Originally created to support deep and dark …☆20Feb 24, 2026Updated 3 weeks ago
- The set of standards that Geomys maintainers strive to uphold in our professional activity as open source maintainers☆39Oct 23, 2025Updated 5 months ago
- Exit if environment variables known to be used as access tokens are set.☆15May 30, 2022Updated 3 years ago
- A Web Platform API proposal for Blob URL☆10Feb 24, 2023Updated 3 years ago
- This is a tiny Chrome Extension that protects your from Clipboard XSS Attacks☆19Mar 30, 2015Updated 10 years ago
- Curated list of enterprise ransomware defense resources☆14Apr 8, 2022Updated 3 years ago
- Dataset fingerprinting for AIBOM☆15Updated this week
- A web server designed to shut off on command to exploit DNS rebinding in Chromium-based browsers☆19Jun 9, 2023Updated 2 years ago
- Data for CyberSOCEval, an LLM benchmark by Meta & CrowdStrike☆21Sep 22, 2025Updated 6 months ago
- Demo of various ways to exploit post based reflected XSS☆18Jul 6, 2023Updated 2 years ago
- This is a custom SSM agent which is sorta functional☆17Jul 5, 2021Updated 4 years ago
- Register your Kubernetes IPs to monitor.shodan.io☆18Oct 28, 2022Updated 3 years ago
- Backdoor that leverages Nmap with setuid permissions to execute commands as root through a Lua-loaded C library☆52Oct 28, 2025Updated 4 months ago
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆19Jan 28, 2021Updated 5 years ago
- Defensive S3 Bucket Squating☆31Jan 18, 2018Updated 8 years ago
- Optimize the utilization of GHAS licenses in an enterprise (or organization)☆15Feb 12, 2026Updated last month
- A tool for identifying misconfigured CloudFront domains☆17Apr 27, 2018Updated 7 years ago
- ☆33Mar 7, 2026Updated 2 weeks ago
- Service implementing some parts of OAuth 2.0 Token Exchange (https://www.rfc-editor.org/rfc/rfc8693.html)☆19Jan 26, 2026Updated last month
- A GitHub Action that helps remove GHAS Licences☆12Jul 15, 2024Updated last year
- A PoC exploit for CVE-2022-41622 - a CSRF in F5 BIG-IP control plane that leads to remote root☆21Oct 20, 2022Updated 3 years ago