mikeharfoot / ThreatMappingView external linksLinks
Code used in analysis and visualisation of IUCN threat maps
☆15Aug 26, 2021Updated 4 years ago
Alternatives and similar repositories for ThreatMapping
Users that are interested in ThreatMapping are comparing it to the libraries listed below
Sorting:
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- Notebook of Google Earth Engine Python API☆14Updated this week
- ☆12Nov 15, 2022Updated 3 years ago
- Elevation - Global version - Version 1☆13Feb 20, 2017Updated 8 years ago
- Fall 2019 repository with course materials for JHU Advanced Data Science☆11Dec 11, 2019Updated 6 years ago
- US states rendered as squares for use in data visualization.☆13May 12, 2015Updated 10 years ago
- a recon framework that facilitates discovering, scanning and monitoring assets trough a configurable engine running on serverless aws inf…☆12Aug 26, 2024Updated last year
- ARCHIVED NatureServe R client☆11Feb 4, 2025Updated last year
- 玩转计算机硬件☆11Apr 22, 2020Updated 5 years ago
- ☆13Sep 11, 2023Updated 2 years ago
- Gaussian Process regression for Empirical Dynamic Modeling☆14Apr 1, 2025Updated 10 months ago
- ☆16Feb 15, 2022Updated 4 years ago
- 👓 monitoring, alerting and threat analysis for ELK stack☆11Mar 27, 2017Updated 8 years ago
- Repository for students to fork☆10Aug 25, 2014Updated 11 years ago
- download CHELSA climate data☆10Oct 28, 2024Updated last year
- 30 day map challenge repo, standing in as my stash of crazy geo tricks in SQL and python☆15Nov 30, 2023Updated 2 years ago
- All in one - Malware + Analysis by Cylance☆11Nov 23, 2018Updated 7 years ago
- Paper introducing deep RL approaches for conservation problems☆13Jul 22, 2022Updated 3 years ago
- Perform phylogenetic path analysis in R.☆13Sep 8, 2025Updated 5 months ago
- Marxan Connect☆14Dec 3, 2021Updated 4 years ago
- ☆15Jun 26, 2023Updated 2 years ago
- All source code, data files, etc. that accompany the book 'Developing a D3.js Edge' by Bleeding Edge Press☆21Apr 17, 2013Updated 12 years ago
- Documents pertaining to internal policies and guidelines☆12Jan 20, 2017Updated 9 years ago
- Historical Observations of Actionable Reputation Data☆13Jun 26, 2018Updated 7 years ago
- An implementation of a device tracking technique based on Algorithm 4 (Double-Hash Port Selection) of RFC 6056.☆16Sep 28, 2022Updated 3 years ago
- TMTG(Twint Mention to Graph) is tools for converting twint user mentions data to network graph for use in Gephi or others network mapping…☆13Aug 5, 2021Updated 4 years ago
- YOLOv6: a single-stage object detection framework dedicated to industrial applications.☆14Jul 18, 2022Updated 3 years ago
- Simple landing page built with Next.js and Material-UI☆11Mar 15, 2021Updated 4 years ago
- [WACV'24] A PyTorch implementation of "BirdSAT: Cross-View Contrastive Masked Autoencoders for Bird Species Classification and Mapping"☆21Oct 30, 2023Updated 2 years ago
- coastTrain: a global reference library for coastal ecosystems☆16Jan 24, 2023Updated 3 years ago
- The Mental Wellness Index is a framework and dashboard tool that provides a picture of community-level mental wellness for each zip code …☆15Dec 28, 2023Updated 2 years ago
- 上科大刘雪松课题组基因组学分析传承与分享知识库☆14Feb 21, 2020Updated 5 years ago
- Repo accompanying my tutorial on medium.com☆14Feb 24, 2017Updated 8 years ago
- Scanning Result of MetaScan's AI GPTScan Engine for 13 DefiHacks Projects under 10 Logic Vuln Types☆13Aug 8, 2023Updated 2 years ago
- Can you pay the ransom in your country?☆14Dec 18, 2023Updated 2 years ago
- ☆16Oct 17, 2020Updated 5 years ago
- Powershell modules and commands that come in handy for pentests and red team assessments.☆18Oct 31, 2018Updated 7 years ago
- SvelteKit project template for capturing Datawrapper chart interaction events☆16Apr 3, 2024Updated last year
- The Soft/Hard Inference through Classification tool for detecting hard and soft selective sweeps☆14Feb 2, 2021Updated 5 years ago