A Blazing fast Security Auditing tool for Kubernetes

Kubestriker Kubestriker performs numerous in depth checks on kubernetes infra to identify the security misconfigurations and challenges that devops engineers/developers are likely to encounter when using Kubernetes, especially in production and at scale. kubestriker is Platform agnostic and works equally well across more than one platform such as self hosted kubernetes, Amazon EKS, Azure AKS, Google GKE etc. How To Install Clone the repo and install To install this tool or clone and run this application, you’ll need Git, python3 […]

Read more

An open source multi-cloud security-auditing tool

Scout Suite Scout Suite is an open source multi-cloud security-auditing tool, which enables security posture assessment of cloud environments. Using the APIs exposed by cloud providers, Scout Suite gathers configuration data for manual inspection and highlights risk areas. Rather than going through dozens of pages on the web consoles, Scout Suite presents a clear view of the attack surface automatically. Scout Suite was designed by security consultants/auditors. It is meant to provide a point-in-time security-oriented view of the cloud account […]

Read more

A benchmark of in-the-wild distribution shifts spanning diverse data modalities

WILDS WILDS is a benchmark of in-the-wild distribution shifts spanning diverse data modalities and applications, from tumor identification to wildlife monitoring to poverty mapping. Installation We recommend using pip to install WILDS: pip install wilds If you have already installed it, please check that you have the latest version: python -c “import wilds; print(wilds.__version__)” # This should print “1.1.0”. If it doesn’t, update by running: pip install -U wilds If you plan to edit or contribute to WILDS, you should […]

Read more

Self-Supervised Monocular 3D Face Reconstruction

MGCNet Self-Supervised Monocular 3D Face Reconstruction by Occlusion-Aware Multi-view Geometry Consistency(ECCV 2020) This is an official python implementation of MGCNet. This is the pre-print version https://arxiv.org/abs/2007.12494. video image Full video can be seen in [YouTube] https://www.youtube.com/watch?v=DXzkO3OwlYQ 1. Code + Requirement + thirdlib We run the code with python3.7, tensorflow 1.13 git clone –recursive https://github.com/jiaxiangshang/MGCNet.git cd MGCNet (sudo) pip install -r requirement.txt (1) For render loss(reconstruction loss), we use the differential renderer named tf_mesh_render(thanks!) https://github.com/google/tf_mesh_renderer.I find many issue happens here, so […]

Read more

A simple tool that generates a Django REST API with the given models

Django CRUD REST API Generator This is a simple tool that generates a Django REST API with the given models. Specs: Authentication, DRF generic views, Routes, PEP8, Dockerized. You can test it out here. To run the generated Django apps Docker and docker-compose are required to run the generated apps. # Unzip the project at ‘Downloads’ or ‘server/projects’. cd django_project # Go into the generated app docker-compose up # Run the containers Run local version Run the server. cd server npm i npm […]

Read more

A collection of scripts for finding threats in Office365

Py365 A collection of scripts for finding threats in Office365. Prerequisities This tool requires Reqeusts, Requests-cache and Jinja2 – these can be installed with pip install -r requirements.txtIt requires an administrative access to AzureAD & Office365 environment to set up but no specific account is required for its continued use.You will need to create a new application registration in the AzureAD portal and grant it the following permissions at the application level and grant admin consent for them: Microsoft Graph […]

Read more

Boundary-preserving Mask R-CNN (ECCV 2020)

BMaskR-CNN This code is developed on Detectron2. Boundary-preserving Mask R-CNNECCV 2020Tianheng Cheng, Xinggang Wang, Lichao Huang, Wenyu Liu Abstract Tremendous efforts have been made to improve mask localization accuracy in instance segmentation.Modern instance segmentation methods relying on fully convolutional networks perform pixel-wise classification,which ignores object boundaries and shapes, leading coarse and indistinct mask prediction results and imprecise localization.To remedy these problems, we propose a conceptually simple yet effective Boundary-preserving Mask R-CNN (BMask R-CNN) toleverage object boundary information to improve mask […]

Read more

Ultra-lightweight human body posture key point CNN model

Ultralight-SimplePose Ultra-lightweight human body posture key point CNN model. ModelSize:2.3MB HUAWEI P40 NCNN benchmark: 6ms/img, Support NCNN mobile terminal deployment Based on MXNET(>=1.5.1) GLUON(>=0.7.0) framework Top-down strategy: The input image is the person ROI detected by the object detector Lightweight mobile terminal human body posture key point model(COCO 17 person_keypoints) Detector:https://github.com/dog-qiuqiu/MobileNetv2-YOLOV3 Mobile inference frameworks benchmark (4*ARM_CPU) Network Resolution Inference time (NCNN/Kirin 990) FLOPS Weight size HeatmapAccuracy Ultralight-Nano-SimplePose W:192 H:256 ~5.4ms 0.224BFlops 2.3MB 74.3% COCO2017 val keypoints metrics evaluate Average Precision […]

Read more

Issue #124 – Towards Enhancing Faithfulness for Neural MT

01 Apr21 Issue #124 – Towards Enhancing Faithfulness for Neural MT Author: Dr. Karin Sim, Machine Translation Scientist @ Iconic Introduction While Neural Machine Translation is generally fluent, it occasionally can be deceptively so, either omitting or adding fragments. In today’s post we examine a method proposed to address this shortcoming and make the model more faithful to the source; Weng et al. (2020) propose a faithfulness-enhanced NMT model, called FENMT. The Problem They surmise that there are potentially 3 […]

Read more
1 21 22 23