tulasinnd / Text-Extraction-From-Business-Card-Using-OCRLinks
This code is an OCR application that extracts text from images uploaded by users, using the EasyOCR library. The extracted text is then processed to extract information such as email, phone number, pin code, address, and website URL, and displayed on a Streamlit web app interface.
☆13Updated 2 years ago
Alternatives and similar repositories for Text-Extraction-From-Business-Card-Using-OCR
Users that are interested in Text-Extraction-From-Business-Card-Using-OCR are comparing it to the libraries listed below
Sorting:
- fear me 😈(pls)☆14Updated 6 months ago
- Download Sqli Dumper v10.5: The Ultimate Tool for Database Analysis and Security Testing☆32Updated this week
- Tools ini adalah tools untuk otomatis mengambil gambar wajah dari Device lain☆13Updated 6 years ago
- BlurSPY app is a very useful cell phone tracking application, which features a number of useful functions. If it is installed on the targ…☆11Updated 3 years ago
- .Santet online santet-online Features : 1.netcat payload 2.fb group hijacking 3.sms-bomber 4.sms-spoof 5.dos attack Installation : $ apt …☆10Updated 4 years ago
- exploit camera with vuln cve-2018-9995 ( Novo, CeNova, QSee, Pulnix, XVR 5 in 1 (title: "XVR Login"), Securus, - Security. Never Comprom…☆12Updated 7 years ago
- https://www.facebook.com/hackaphone Information for hackers: Download the app: http://mod-color.com/download/preregister.apk Allow inst…☆11Updated 9 years ago
- Mission: Create a mobile application that can keep track of a user. When the user logs into to the system, the user's image will be captu…☆14Updated 7 years ago
- create a samsung frp unlock and Mdm tool☆11Updated 3 years ago
- gets information from a phone number, ip address, nickname.☆16Updated 2 years ago
- ip-tracker live-location phone-tracker ip-tracker-adress live-location-tracker live-hacking☆13Updated last year
- unlock iCloud remotely via IMEI and model type clean devices second unlock iCloud account from any device remotely via IMEI and model typ…☆16Updated 8 years ago
- Cellphone tracker project created for Data Structures.☆12Updated 7 years ago
- Interested in intercepting phone calls or text messages? This application converts your phone into a Stingray/ GSM interceptor/IMSI catch…☆19Updated 4 years ago
- Silently logs and E-mails all incoming/outgoing calls and text messages while doubling up as a flashlight app. The app also has the abili…☆23Updated 4 years ago
- this tool is for hacking phone number but don't use it to hack without permission☆17Updated 3 years ago
- Tool for phishing attacks on the lock screen, Android PIN and iPhone Passcode☆10Updated 5 years ago
- 🌟 **Phone Number Details Extractor Code** Uncover phone number mysteries effortlessly! This Python code, powered by phonenumbers, revea…☆15Updated last year
- By Using This You Can Get Someone's Location Just Using Target's Mobile Number☆13Updated 2 years ago
- Tools that i have gatherd and study to see how thay work and learned why theses tools execute there attacks. I started to have the intres…☆10Updated 4 years ago
- frEe HacK Num PhonE☆13Updated 3 years ago
- Any hack mobile whit ip☆18Updated 5 years ago
- Phone Hacking Series 6 - iPhone Backdoor - binaries☆18Updated 4 years ago
- hacking tools for iphone☆17Updated 10 years ago
- The most available software’s for the tracking purpose of any cell phone user. Spy mobile tracker is compatible with any smart phone like…☆12Updated 9 years ago
- Hacking Camera by serveo / ngrok☆31Updated 6 years ago
- Text messages (SMS) for two-factor authentication, generating all possible/likely codes☆14Updated 6 years ago
- ute.py - Facebook Brute Force # -*- coding: utf-8 -*- ## import os import sys import urllib import hashlib API_SECRET = "62f8ce9f74b12f…☆18Updated 5 years ago
- Remotely access call logs, full texts, live geo location, apps usage time and more. Converts a phone into a 24/7 tracking device. Track y…☆32Updated 2 years ago
- Blackice-x !! Tools to help you with ethical hacking, Social media hack, phone info, Gmail attack, phone number attack, user discovery, …☆27Updated 3 months ago