PBN Obfuscator: A overpowered obfuscator for python, which will help you protect your source code

PBN Obfuscator is a overpowered obfuscator for python, which will help you protect your source code. If you are running the file directly without any custom sys.argv arguments then you can input your code. And if there are custom sys.argv arguments then it will go like this: python3 obfuscator.py . However if you aren’t running the file directly then you can just call the obfuscate() function. print(“Made by poggersbutnot.”) def llnt(*eyjx): wgommt = [] for teyij in eyjx: wgommt.append(getattr(__import__(“x62x75x69x6cx74x69x6ex73”), “x63x68x72”)(teyij)) […]

Read more

Advance market place website written in django

Advance market place website written in django 🙂 Online fashion store for wholesalers and retailers. 🗒 Note: This project does not have a shopping cart and wholesalers can register their order through WhatsApp. ⭐️ PicoStyle features Market place Advance admin panel Multilanguage Multilayer filtering Advance category system Session-based favorite list (wish list) Newsletter News system ⚙️ Config the project First you should make venv for this project.So in the main root of project you should type this command in your […]

Read more

Sentinel-2 Super-Resolution Segmentation Network

Sentinel-2 Super-Resolution Segmentation Network Installation Basic To help out with development, start by cloning this repo-url Then I recommend using mambato install both non-python binaries and python libraries.A virtual environment will also be created with Python andJupyterLab installed. cd s2s2net mamba env create –file environment.yml Activate the virtual environment first. Finally, double-check that the libraries have been installed. Advanced This is for those who want full reproducibility of the virtual environment. Making an explicit conda-lock file(only needed if creating a […]

Read more

SAP memory pipes(MPI) desynchronization vulnerability CVE-2022-22536

SAP memory pipes desynchronization vulnerability(MPI) CVE-2022-22536. Description POC for CVE-2022-22536: SAP memory pipes(MPI) desynchronization vulnerability. create by antx at 2022-02-15. Detail SAP NetWeaver Application Server ABAP, SAP NetWeaver Application Server Java, ABAP Platform, SAP Content Server 7.53 and SAP Web Dispatcher are vulnerable for request smuggling and request concatenation. An unauthenticated attacker can prepend a victim’s request with arbitrary data. This way, the attacker can execute functions impersonating the victim or poison intermediary Web caches. A successful attack could result […]

Read more

A PyTorch Implementation code for developing super fast adversarial training

This is a PyTorch Implementation code for developing super fast adversarial training. This code is combined with below state-of-the-art technologies for accelerating adversarial attacks and defenses with Deep Neural Networks on Volta GPU architecture. Distributed Data Parallel [link] Channel Last Memory Format [link] Mixed Precision Training [link] Mixed Precision + Adversarial Attack (based on torchattacks [link]) Faster Adversarial Training for Large Dataset [link] Fast    

Read more

A simple implementation of Hamiltonian Monte Carlo in JAX

This is a simple implementation of Hamiltonian Monte Carlo in JAX that is vectorized and supports pytree parameters (i.e. tree-like structures). Here’s a minimal example to sample from a distribution: import jax import jax.numpy as jnp from hmc import hmc_sampler # define target distribution def target_log_pdf(params): return jax.scipy.stats.t.logpdf(params, df=1).sum() # run HMC params_init = jnp.zeros(10)    

Read more

Python code for ICLR 2022 spotlight paper EViT: Expediting Vision Transformers via Token Reorganizations

This repository contains PyTorch evaluation code, training code and pretrained EViT models for the ICLR 2022 Spotlight paper: Not All Patches are What You Need: Expediting Vision Transformers via Token Reorganizations Youwei Liang, Chongjian Ge, Zhan Tong, Yibing Song, Jue Wang, Pengtao Xie The proposed EViT models obtain competitive tradeoffs in terms of speed / precision: If you use this code for a paper please cite: @inproceedings{liang2022evit, title={Not All Patches are What You    

Read more

A simple MenuBar app that shows the price of 3 cryptocurrencies

A very simple MenuBar app that shows the price of the following cryptocurrencies: Screenshot Goals While this is just a very simple app that displays the price of a set of cryptocurrencies, the goal is to create a more feature rich application that displays chart data for a basket of other cryptocurrencies and potentially also incorporate a news section aswell. References GitHub View Github    

Read more

Breaching privacy in federated learning scenarios for vision and text

This PyTorch framework implements a number of gradient inversion attacks that breach privacy in federated learning scenarios,covering examples with small and large aggregation sizes and examples both vision and text domains. This includes implementations of recent work such as: But also a range of implementations of other attacks from optimization attacks (such as “Inverting Gradients” and “See through Gradients”) to recent analytic and recursive attacks. Jupyter notebook examples for these attacks can be found in the examples/ folder. Overview: This […]

Read more

Gracefully face hCaptcha challenge with Yolov5(ONNX) embedded solution

Introduction Does not rely on any Tampermonkey script. Does not use any third-party anti-captcha services. Just implement some interfaces to make AI vs AI possible. Requirements Python 3.7+ google-chrome Usage Clone the project code in the way you like. Execute the following command in the project root directory. # hcaptcha-challenger pip install -r ./requirements.txt Download Project Dependencies. The implementation includes downloading the YOLOv5 target detection model and detecting google-chrome in the current environment. If google-chrome is missing please follow the […]

Read more
1 258 259 260 261 262 978