chrisjd20 / img_rec_tf_ml_demoView external linksLinks
Image Recognition Using TensorFlow Machine Learning Demo to recognize Apples from Bananas
☆24Jul 19, 2025Updated 6 months ago
Alternatives and similar repositories for img_rec_tf_ml_demo
Users that are interested in img_rec_tf_ml_demo are comparing it to the libraries listed below
Sorting:
- ☆17Dec 14, 2019Updated 6 years ago
- ☆10Sep 11, 2021Updated 4 years ago
- public assets for ironcat emulation software ;)☆14Sep 8, 2023Updated 2 years ago
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago
- System Validation Platform☆12Sep 18, 2025Updated 4 months ago
- Splunk scripted input for opening a backconnect shell on a remote forwarder☆45Nov 18, 2020Updated 5 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- ☆10Apr 18, 2019Updated 6 years ago
- Execute system calls over the network☆11Nov 17, 2014Updated 11 years ago
- Simple Linux Kernel Module rootkit for 5.x/6.x x86/64 only☆13Apr 21, 2025Updated 9 months ago
- ☆11Sep 26, 2019Updated 6 years ago
- The Scorebot Engine is a platform that allows scoring, host checking and other cool stuff☆10Nov 10, 2024Updated last year
- RACF Database Parser☆11Apr 4, 2024Updated last year
- Get notified instantly when your users of interest speak about something.☆10Mar 24, 2020Updated 5 years ago
- ☆11Sep 13, 2019Updated 6 years ago
- Uses the default firebird database credentials to perform a database dump☆11Jan 10, 2015Updated 11 years ago
- An assortment of general guides I've currated for general teaching purposes focusing on red / blue team methodologies and tasks.☆13Feb 3, 2018Updated 8 years ago
- Fetching data from system☆12Jun 18, 2017Updated 8 years ago
- Resources for I Want My EIP, presented at Derbycon 2017☆11Sep 23, 2017Updated 8 years ago
- A library to determine the location of someone on the Internet☆16Dec 17, 2025Updated 2 months ago
- Collection of operational focused osquery dashboards.☆11Jan 20, 2021Updated 5 years ago
- Finding Valuable Needles in Global Source Code Haystacks with Automation☆17Feb 11, 2021Updated 5 years ago
- PoC multi-layer protector for ELF32 x86 binaries☆12Feb 26, 2022Updated 3 years ago
- The Gruqg's old hacking harness, from times of old before github☆14Mar 10, 2018Updated 7 years ago
- Scripts for x64dbg to find the OEP of exe files packed with UPX☆15Aug 2, 2017Updated 8 years ago
- Simple tool to extract icons from a pe file and other useful information☆13Jun 22, 2018Updated 7 years ago
- Reverse Shell troll software☆12Sep 24, 2019Updated 6 years ago
- pwntools for go!☆12Jul 14, 2019Updated 6 years ago
- Binary matching with Binary Ninja☆22Jul 8, 2024Updated last year
- Pytest plugin: add multihost framework.☆11Nov 27, 2025Updated 2 months ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Apr 13, 2017Updated 8 years ago
- Splunk Boss of the SOC v1 data set.☆113Jun 13, 2018Updated 7 years ago
- Communicate with a remote shell easily☆12Dec 10, 2017Updated 8 years ago
- A different take on Viss's eagleeye project, optimized for use in clouds☆33Apr 19, 2013Updated 12 years ago
- SmartResponse plugin development.☆15Sep 25, 2019Updated 6 years ago
- Robots.txt exclusion for Wagtail, complementing Sitemaps.☆15Jun 14, 2024Updated last year
- Currently proof-of-concept☆17Dec 17, 2021Updated 4 years ago
- Fake traceroute hop generator☆13Apr 1, 2021Updated 4 years ago
- ☆22Nov 27, 2013Updated 12 years ago