I train a model using TensorFlow to detect the suit and number of a playing card. I created my own dataset by taking pictures of each card, then performing data augmentation using rotate, zoom, brighten, and shear functions.
☆14Aug 6, 2020Updated 5 years ago
Alternatives and similar repositories for Playing-Cards-Computer-Vision
Users that are interested in Playing-Cards-Computer-Vision are comparing it to the libraries listed below
Sorting:
- Caterpillar is a security scanning library for AI agent skill files (e.g., Claude Code skills) for dangerous or malicious behavior☆32Feb 16, 2026Updated last week
- Small Node CLI tool to extract active contributors on repos and orgs☆10Dec 6, 2022Updated 3 years ago
- ☆10Jan 14, 2015Updated 11 years ago
- Kantega Web Application Security Hero Challenge☆19Dec 3, 2020Updated 5 years ago
- ☆11Oct 30, 2019Updated 6 years ago
- Solving CAPTCHA with Image Classification☆10Mar 13, 2025Updated 11 months ago
- ☆10Jan 30, 2017Updated 9 years ago
- Assess certain AWS network configurations☆12Aug 22, 2018Updated 7 years ago
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 10 months ago
- token exchange as a service☆11Feb 23, 2026Updated last week
- Pipe stuff to Neo4j☆10Jun 4, 2020Updated 5 years ago
- vBrowser is a secure, containerized browser platform designed for covert web investigations. Originally created to support deep and dark …☆20Updated this week
- The set of standards that Geomys maintainers strive to uphold in our professional activity as open source maintainers☆38Oct 23, 2025Updated 4 months ago
- Safety philosopy: example principles for an organization and management☆13Apr 14, 2025Updated 10 months ago
- ☆14Jan 8, 2026Updated last month
- Optimize the utilization of GHAS licenses in an enterprise (or organization)☆15Feb 12, 2026Updated 2 weeks ago
- Home of code related to security of network systems.☆25Jan 22, 2025Updated last year
- Dataset fingerprinting for AIBOM☆15Feb 18, 2026Updated last week
- Curated list of enterprise ransomware defense resources☆14Apr 8, 2022Updated 3 years ago
- Chat app for Android that supports answers from multiple LLMs at once. Bring your own API key AI client. Supports OpenAI, Anthropic, Goog…☆13Oct 30, 2024Updated last year
- A web server designed to shut off on command to exploit DNS rebinding in Chromium-based browsers☆18Jun 9, 2023Updated 2 years ago
- A GitHub Action that helps remove GHAS Licences☆12Jul 15, 2024Updated last year
- Host Internal Static Website on AWS☆17Dec 6, 2023Updated 2 years ago
- The ImageMagick Security Policy Evaluator allows developers and security experts to check if an XML Security Policy is hardened against a…☆18Feb 6, 2023Updated 3 years ago
- Data for CyberSOCEval, an LLM benchmark by Meta & CrowdStrike☆20Sep 22, 2025Updated 5 months ago
- ⛔️ DEPRECATED Schibsted Account SDK for Android☆14Oct 27, 2021Updated 4 years ago
- ☆32Feb 23, 2026Updated last week
- Exit if environment variables known to be used as access tokens are set.☆15May 30, 2022Updated 3 years ago
- ☆18Jul 30, 2024Updated last year
- This is a custom SSM agent which is sorta functional☆17Jul 5, 2021Updated 4 years ago
- Manage your AWS SSM parameters☆16Jul 26, 2019Updated 6 years ago
- ☆24Mar 20, 2025Updated 11 months ago
- An authentication API based on AWS Cognito☆20Feb 6, 2026Updated 3 weeks ago
- List over kjente norske bug bounty-program 🇳🇴☆23Sep 22, 2025Updated 5 months ago
- Defensive S3 Bucket Squating☆31Jan 18, 2018Updated 8 years ago
- A tool to discover bygonessl vulnerabilities using the facebook API☆20Oct 2, 2019Updated 6 years ago
- This is a tiny Chrome Extension that protects your from Clipboard XSS Attacks☆19Mar 30, 2015Updated 10 years ago
- Gather all external facing AWS Services and run it through nmap☆13Feb 3, 2022Updated 4 years ago
- A tool for identifying misconfigured CloudFront domains☆17Apr 27, 2018Updated 7 years ago