sueiras / handwritting_characters_databaseView external linksLinks
☆17Jun 2, 2024Updated last year
Alternatives and similar repositories for handwritting_characters_database
Users that are interested in handwritting_characters_database are comparing it to the libraries listed below
Sorting:
- Notebooks and other course materials for Emory QTM 340 (Fall 2022)☆12Dec 13, 2022Updated 3 years ago
- User-friendly viewer for Parquet files☆10Jan 10, 2026Updated last month
- A library for probing Stockfish's NNUEs. The code for reading parameters and forward propagation is taken from Stockfish☆12Nov 18, 2025Updated 2 months ago
- ☆15Oct 24, 2023Updated 2 years ago
- A list of all projects by UW CSE students.☆10Feb 8, 2016Updated 10 years ago
- ☆13Feb 26, 2021Updated 4 years ago
- Benchmark of common hash functions☆10Sep 15, 2019Updated 6 years ago
- Find unicode codepoints to use in normalisation and transformation attacks.☆11Mar 15, 2021Updated 4 years ago
- Notes Template/Checklist for PEN-300 OSEP☆16Nov 20, 2021Updated 4 years ago
- Python Module implementing SRP☆12Jul 29, 2022Updated 3 years ago
- An accurated list of things to test while pentesting☆11Jan 2, 2021Updated 5 years ago
- Flexible guide to performing code review☆10Jul 17, 2017Updated 8 years ago
- LLM Vulnerable Application☆13Aug 19, 2023Updated 2 years ago
- Vulnerable LLM Application☆14Jan 1, 2024Updated 2 years ago
- Simple pytorch net evaluator with Bad Gyal 8 and Mean Girl 8 net included.☆10Nov 23, 2020Updated 5 years ago
- The Official ColdBox MVC Platform Documentation☆16Updated this week
- Code for training LSTM neural network on top of convolutional features for captcha recognition in Moscow subway☆11Aug 8, 2017Updated 8 years ago
- Cellular Automata - Pokemon Type Battle Simulation☆10Oct 26, 2024Updated last year
- the MSER for text detection☆11Jun 20, 2017Updated 8 years ago
- Security and Privacy Failures in Popular 2FA Apps☆19Oct 5, 2023Updated 2 years ago
- TurboFuzzLLM: Turbocharging Mutation-based Fuzzing for Effectively Jailbreaking Large Language Models in Practice☆22Nov 24, 2025Updated 2 months ago
- Ref: API-Security-Checklist☆14Mar 31, 2023Updated 2 years ago
- Official implementation of "Data Mixture Inference: What do BPE tokenizers reveal about their training data?"☆18May 15, 2025Updated 9 months ago
- 身份证号码图块提取程序,采用opencv_mser☆14Sep 11, 2018Updated 7 years ago
- Extensible vulnerable AI Bot to illustrate vulnerabilities in LLM applications.☆18Jun 17, 2024Updated last year
- Information Security using Steganography over Cryptography☆14Aug 31, 2024Updated last year
- Get vue-router routes config from file system.☆12Oct 26, 2018Updated 7 years ago
- A simple chat app☆16Dec 7, 2022Updated 3 years ago
- Cover your head. Security headers middlware☆21Dec 5, 2013Updated 12 years ago
- After getting heavy demand on my Crest CPSA. I am sharing my notes on Network Security Assessment from recommended book for CPSA. Please …☆16Jun 9, 2023Updated 2 years ago
- Full frontend code for the getrumin.com web app☆16Nov 30, 2021Updated 4 years ago
- Jokes☆13Jul 11, 2024Updated last year
- ANE accelerated embedding models!☆20Dec 11, 2024Updated last year
- Checklists☆16Sep 22, 2016Updated 9 years ago
- dotfiles for vim, bash, git, irb, tmux☆17Aug 27, 2025Updated 5 months ago
- An amateur attempt at breeding a chess-playing AI.☆12Jan 28, 2026Updated 2 weeks ago
- The training codes of Jasper-Token-Compression-600M☆19Nov 19, 2025Updated 2 months ago
- A list of important security checks for GitHub individual and organization accounts☆15Jan 1, 2018Updated 8 years ago
- Sparsify Your Flux Models☆14Sep 20, 2023Updated 2 years ago