Detect Duplicate Images Blazingly Fast
☆12Dec 3, 2021Updated 4 years ago
Alternatives and similar repositories for Duplicate-Images-Detection-using-Parallel-Processing
Users that are interested in Duplicate-Images-Detection-using-Parallel-Processing are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- GitGram Find Important Users in your network, People you can work with based on analysis, recommended people you should network with, rep…☆12Jun 19, 2025Updated 10 months ago
- Downloading 4K Resolution made easy *_*☆20May 2, 2022Updated 3 years ago
- A tool to find sensitive Keys and Passwords in your cookies, A reference guide on how to exploit them.☆19Oct 19, 2020Updated 5 years ago
- MultiThreaded Application to Scrape Working Web Proxies☆34Sep 16, 2025Updated 7 months ago
- Hi 👋 I am a GitHub 🤖☆22Jul 16, 2020Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Let your friends know when you are online and offline xD☆12Mar 28, 2021Updated 5 years ago
- MultiThreaded spammer, 100% working | Consumes Data because of too high speed | You can decrease speed but I don't think that's what we w…☆87Jan 18, 2024Updated 2 years ago
- ☆11Aug 5, 2015Updated 10 years ago
- A Flask API to deploy machine learning models☆18Apr 23, 2020Updated 5 years ago
- Single-WebApp-Target essentials testing methodology tool starting at recon-information gathering for the juicy stuff ended up in exploita…☆23Jun 15, 2021Updated 4 years ago
- Spring Boot Applications☆12May 12, 2021Updated 4 years ago
- Исходные тексты видео курса "Уроки Love2D, Roblox и Lua для всех"☆16Oct 28, 2021Updated 4 years ago
- Artificial Intelligence with Power BI, published by Packt☆23Mar 2, 2026Updated last month
- This repo contains the code for and end-to-end machine learning project. The goal of this project is to build a web application that host…☆12Apr 25, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- My solutions for Parallel, Concurrent and Distributed Programming in Java (Rice university)☆29Nov 3, 2020Updated 5 years ago
- The script specializes in collecting information about sites, protocols and servers, facilitating work on the Metasploit project and repa…☆13Oct 31, 2018Updated 7 years ago
- ☆27Oct 18, 2023Updated 2 years ago
- A comparison of Median filter and Wiener filter in image restoration.☆19May 7, 2019Updated 6 years ago
- 🐚ᴠʟᴀɴɢ ʀᴇᴠᴇʀsᴇ sʜᴇʟʟ🐚☆11Apr 28, 2022Updated 3 years ago
- ☆10Sep 19, 2018Updated 7 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆13Aug 31, 2019Updated 6 years ago
- Extract username and passwords from IPTV urls☆12Nov 8, 2025Updated 5 months ago
- Wi-Fi Hacking Workshop☆14Dec 27, 2020Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Yet Another ASGI Toolkit☆10Jun 1, 2022Updated 3 years ago
- Looks up details on a public IPV4 address against ip-info and blacklist-search sites. Providing a reputation check.☆11Oct 16, 2021Updated 4 years ago
- ☆11May 11, 2016Updated 9 years ago
- Scrape emails, phone numbers and social media accounts from a website. You can use the found information to gather more information or ju…☆15Dec 6, 2021Updated 4 years ago
- [Checker Emails Twitter + Login API Twitter] - API REST Twitter☆10Aug 18, 2018Updated 7 years ago
- ☆15Aug 24, 2019Updated 6 years ago
- ☆51Aug 18, 2024Updated last year
- Lazy SPL to detect Spring4Shell exploitation☆12Jul 8, 2022Updated 3 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆15Jan 9, 2019Updated 7 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Class☆10Nov 10, 2020Updated 5 years ago
- Custom Deserializer☆13Feb 1, 2017Updated 9 years ago
- cydia源☆10Mar 20, 2022Updated 4 years ago
- ☆13Jul 16, 2021Updated 4 years ago
- Recon Dog is an all in one tool for all your basic information gathering needs.☆11Mar 2, 2018Updated 8 years ago
- An reimplementation of Microsoft DSSM☆12Sep 2, 2015Updated 10 years ago
- :e-mail: Enumerate usernames through SMTP service☆18Jun 30, 2019Updated 6 years ago