☆17Jun 2, 2024Updated last year
Alternatives and similar repositories for handwritting_characters_database
Users that are interested in handwritting_characters_database are comparing it to the libraries listed below
Sorting:
- Notebooks and other course materials for Emory QTM 340 (Fall 2022)☆12Dec 13, 2022Updated 3 years ago
- User-friendly viewer for Parquet files☆10Updated this week
- A library for probing Stockfish's NNUEs. The code for reading parameters and forward propagation is taken from Stockfish☆12Nov 18, 2025Updated 3 months ago
- A list of all projects by UW CSE students.☆11Feb 8, 2016Updated 10 years ago
- ☆14Jul 26, 2021Updated 4 years ago
- Python Module implementing SRP☆12Jul 29, 2022Updated 3 years ago
- Notes Template/Checklist for PEN-300 OSEP☆16Nov 20, 2021Updated 4 years ago
- FlexiTokens☆18Dec 27, 2025Updated 2 months ago
- Benchmark of common hash functions☆10Sep 15, 2019Updated 6 years ago
- Interactive Article Explaining Isomap☆44Jan 6, 2026Updated 2 months ago
- Flexible guide to performing code review☆10Jul 17, 2017Updated 8 years ago
- Jokes☆13Jul 11, 2024Updated last year
- Ref: API-Security-Checklist☆14Mar 31, 2023Updated 2 years ago
- Full frontend code for the getrumin.com web app☆16Nov 30, 2021Updated 4 years ago
- GATSim: Generative-Agent Transport Simulation☆24Updated this week
- An amateur attempt at breeding a chess-playing AI.☆12Jan 28, 2026Updated last month
- Checklists☆16Sep 22, 2016Updated 9 years ago
- Megagrep helps beginning a code review by searching for keywords in the code using "grep". It does not search for vulnerabilities directl…☆15Aug 8, 2022Updated 3 years ago
- A dataset with chess board images in various positions.☆16Sep 14, 2025Updated 5 months ago
- Learning To Taste☆16Feb 14, 2025Updated last year
- Extensible vulnerable AI Bot to illustrate vulnerabilities in LLM applications.☆20Jun 17, 2024Updated last year
- Utilities for working with videos☆13Jul 5, 2025Updated 8 months ago
- After getting heavy demand on my Crest CPSA. I am sharing my notes on Network Security Assessment from recommended book for CPSA. Please …☆16Jun 9, 2023Updated 2 years ago
- Junior Dev Website☆11Oct 4, 2022Updated 3 years ago
- FTP Server based on Python.☆13Oct 22, 2012Updated 13 years ago
- An online checklist guide for performing code reviews☆15Feb 9, 2023Updated 3 years ago
- Double-checked Gold Standard Data for Training and Testing OCR Engines☆18Jun 15, 2017Updated 8 years ago
- Highly optimized K-SVD implementation in Julia, with several parallelization techniques available.☆21Jan 25, 2026Updated last month
- The source code for the TIRA Shared Task Platform☆17Feb 27, 2026Updated last week
- Dependency graph generator for C++ code.☆19Feb 1, 2019Updated 7 years ago
- ☆26Nov 18, 2025Updated 3 months ago
- View screenshots as a slideshow over http☆15Mar 13, 2020Updated 5 years ago
- Workflow for pentesting web applications.☆21Feb 19, 2019Updated 7 years ago
- An example vulnerable app that integrates an LLM☆26Apr 5, 2024Updated last year
- Prompts Methods to find the vulnerabilities in Generative Models☆20Feb 23, 2023Updated 3 years ago
- Toolkit for domain-specific information retrieval experimentation☆19Feb 24, 2026Updated last week
- Hugging Face and Pyserini interoperability☆19May 18, 2023Updated 2 years ago
- Neo4J visualisation tool for the Code Property Graph☆14May 17, 2021Updated 4 years ago
- Payloads for SQLi☆19May 2, 2020Updated 5 years ago