☆28Dec 15, 2022Updated 3 years ago
Alternatives and similar repositories for aistorychat
Users that are interested in aistorychat are comparing it to the libraries listed below
Sorting:
- Yolo26 model supports android deployment.☆27Jan 21, 2026Updated last month
- ☆13Feb 26, 2017Updated 9 years ago
- XViewer is a easy tools for data visualization. You can use it to visualize a data file or a data dir such as EuROC, TUM VIO dataset.☆17Jan 3, 2025Updated last year
- AuraRing: Precise Electromagnetic Finger Tracking (IMWUT 2019)☆16Jan 6, 2020Updated 6 years ago
- Use accelerometer, magnetometer, gyroscope data, use ESKF to estimate attitude.☆15Jan 1, 2021Updated 5 years ago
- ☆22Jul 24, 2022Updated 3 years ago
- Title database for Rich Presence U.☆15Updated this week
- A cross platform Go library to work with Windows Security Descriptors☆41Mar 13, 2026Updated last week
- A Raspberry pi distribution to simply connect your Nintendo DS/Wii back to the internet.☆16Dec 25, 2023Updated 2 years ago
- Http proxy on top of HttpListener (.Net Framework). Uses multiple async writes to guarantee fast response.☆14Jan 8, 2015Updated 11 years ago
- Captures EMG signals from GForcePro and play sound according to individual channel signal.☆17Aug 19, 2025Updated 7 months ago
- A browser extension that screenshots a page in multiple media queries / device sizes with a single click.☆11Sep 9, 2021Updated 4 years ago
- This Telegram bot automatically restricts every user, and provides a button with which they can redeem themselves.☆10Dec 8, 2022Updated 3 years ago
- Backend for the OpenShock solution, that enables controlling shock collars over the internet.☆21Updated this week
- wrapper for the c++ version of the april tags, the current ROS version uses the java version of april_tk which consumes 0.9-1.4GB ram☆18May 12, 2014Updated 11 years ago
- A cross-platform tool to parse and describe the contents of a raw ntSecurityDescriptor structure☆48Oct 4, 2025Updated 5 months ago
- The main repository for the rewrite of emmVRC☆13Jun 15, 2022Updated 3 years ago
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- Baselines for the Image Matching Benchmark and Challenge☆19Oct 1, 2020Updated 5 years ago
- Web Chromecast player☆17Apr 8, 2024Updated last year
- Python crawler for remote Windows shares☆12Nov 29, 2015Updated 10 years ago
- Periodically check hashcat cracking progress and notify of success.☆10Dec 18, 2018Updated 7 years ago
- Inspired by missing features of currently existing AV3 markers, I created my own version, designed to make communication as a mute in VRC…☆13Oct 19, 2022Updated 3 years ago
- 3D-Printable models for shocker spacers, transmitter cases, and more.☆18Oct 16, 2024Updated last year
- Monster Hunter 3 (~tri) Server Project patcher☆18Dec 21, 2022Updated 3 years ago
- Clone of Valve's prototype headphones☆15Aug 12, 2024Updated last year
- Compiled Binaries for Sharp Suite☆15Dec 28, 2019Updated 6 years ago
- Superset of NOKIA's RTTTL which adds polyphony & vibrato. Includes Python and C implementations.☆21Feb 28, 2026Updated 2 weeks ago
- Python implementation of the 'Perfect' serialization format used in Infinity Nikki.☆19Sep 2, 2025Updated 6 months ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- A 512 byte usb bootloader for the nrf24lu1+☆16Mar 20, 2018Updated 8 years ago
- A guide for porting mods in BeatSaber☆17Mar 10, 2022Updated 4 years ago
- headless client for love live school idol festival all stars + web ui☆14Jun 2, 2022Updated 3 years ago
- Just a git repo for the sleepmask detection rule i found in https://codex-7.gitbook.io/codexs-terminal-window/blue-team/detecting-cobalt-…☆16Jun 4, 2025Updated 9 months ago
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Mar 10, 2019Updated 7 years ago
- Call your own DLL from VBA and execute code under process svchost.exe with WMI☆12Mar 6, 2020Updated 6 years ago
- Dll hijack -- just one macro☆13Jul 3, 2023Updated 2 years ago
- Run each docker-compose.yml inside one unprivileged LXC container, on Proxmox (PVE).☆24Feb 27, 2024Updated 2 years ago
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year