Cyber Offenders are related CDR/IPDRs are very important for LEAs, the given CDR/IPDR data is in a Spreadsheet/Excel/CSV/Notepad (Rows & Column Structure) file format. Desired Solution: The solution should take different input file formats like .XLSX, .CSV, TXT. and it shall convert into Info Graphical and Data Visualizer forms with connected R…
☆18Aug 4, 2020Updated 5 years ago
Alternatives and similar repositories for Sih_Rk312_winterfell
Users that are interested in Sih_Rk312_winterfell are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Legal Ledger: A blockchain-powered app for ultra-secure and unchangeable storage of legal documents. Decentralized, tamper-proof, and bui…☆14Dec 30, 2023Updated 2 years ago
- Machine learning-based application for predicting the injury recovery time period a sports person based on injury type and diet plan.☆41Jun 16, 2019Updated 6 years ago
- Solution to SIH 22 problem statement Smart Attendance☆10Jun 20, 2023Updated 2 years ago
- This project was created as a part of Smart India Hackathon 2022 and aims to track nutritinal requirement and calorie intake of Students …☆12Sep 2, 2022Updated 3 years ago
- Smart India Hackathon☆12Jun 16, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- An Application acts as a guide for the common people in locating a financial service touch point at a given location in the country.☆15Jul 28, 2023Updated 2 years ago
- Password-Authentication-Prototype☆31Aug 11, 2022Updated 3 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆13Jun 13, 2020Updated 5 years ago
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Oct 13, 2020Updated 5 years ago
- Monitor Files and Folders for Changes in Real Time .☆11Jan 10, 2019Updated 7 years ago
- An Advanced PHP Cryptography Framework☆16Feb 12, 2024Updated 2 years ago
- Smart India Hackathon 2023☆34Nov 1, 2023Updated 2 years ago
- Vulnerability Knowledge Base comparison tool☆13Feb 9, 2022Updated 4 years ago
- Discord Scripts☆12Nov 30, 2019Updated 6 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Slack integration for MagicMirror²☆10Sep 9, 2020Updated 5 years ago
- ☆10Jan 8, 2018Updated 8 years ago
- A collection of personal ZAP scripts☆13Apr 10, 2023Updated 2 years ago
- Sn0ffer - Make sound/noise/music with your network connection!☆20Jul 1, 2016Updated 9 years ago
- AgentTesla botnet C&C RCE exploit.☆16Aug 13, 2019Updated 6 years ago
- Some YARA rules i will add from time to time☆12May 31, 2019Updated 6 years ago
- Stanford CoreNLP NER addon for Apache Tika's NamerEntityParser☆13Feb 26, 2022Updated 4 years ago
- Upload, save and run keystroke injection payloads with an ESP8266 + ATMEGA32U4☆12Aug 14, 2019Updated 6 years ago
- The_Scripter is tools for making pentesting easy. It contains lots of automation scripts like hash cracker, ssh_cracker,etc.☆14Nov 25, 2022Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A collection of handy Bash One-Liners and terminal tricks for data processing and Linux system maintenance.☆15Jul 19, 2020Updated 5 years ago
- Automated Real-Time Threat Hunting with ATD, Active Response and Elasticsearch/Kibana☆10Aug 17, 2018Updated 7 years ago
- 🐊 A small Password Attack☆15Apr 1, 2024Updated last year
- Transform EQL detection rules to VQL artifacts☆12Nov 12, 2021Updated 4 years ago
- Query.AI plugin for Kibana☆13Nov 10, 2019Updated 6 years ago
- A small, lightweight, and portable tool for injecting code or text to any other file or replacing a keyword.☆15Apr 13, 2023Updated 2 years ago
- Various components we use in labs☆10Oct 30, 2020Updated 5 years ago
- Kestrel Jupyter Notebook Kernel☆10Oct 19, 2023Updated 2 years ago
- ☆18Jul 30, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Hack Cameras CCTV FREE☆17Aug 22, 2021Updated 4 years ago
- A Cross Platform multifunctional (Windows/Linux/Mac) RAT.☆17Oct 8, 2020Updated 5 years ago
- Extract endpoints from specific Git repository for fuzzing☆23Nov 3, 2020Updated 5 years ago
- Netcap Tensorflow Deep Neural Network☆15Apr 26, 2020Updated 5 years ago
- Medicine Time is an native android application meant to aid the forgetful and busy with remembering to take their daily medications. It i…☆67Jul 22, 2022Updated 3 years ago
- Chitrarth: Bridging Vision and Language for a Billion People☆13Feb 12, 2025Updated last year
- BruteForce SSH Login Credentials much Faster...!...Bring the Thunder of Asgard to SSH☆18May 2, 2024Updated last year