Self-Distilled Internet Photos (SDIP) Dataset

Self-Distilled Internet Photos (SDIP) is a multi-domain image dataset. The dataset consists of Self-Distilled Flickr (SD-Flickr) and Self-Distilled LSUN (SD-LSUN) that were crawled from Flickr and LSUN dataset, respectively, and then curated using the method described in our Self-Distilled StyleGAN paper: Self-Distilled StyleGAN: Towards Generation from Internet PhotosRon Mokady, Michal Yarom, Omer Tov, Oran Lang, Daniel Cohen-Or, Tali Dekel, Michal Irani, Inbar Mosserihttps://arxiv.org/abs/2202.12211 Overview StyleGAN’s fascinating generative and editing abilities are limited to structurally aligned and well-curated datasets. It does […]

Read more

Go live easily and stream videos in Telegram channels

A bot for streaming in Telegram RTMP streams. Get Started Use a Cloud Platform Manually Prerequisites Configure In order to configure the bot, you have to set the following environmental variables: APP_HASH APP_ID BOT_TOKEN RTMP_KEY RTMP_URL Or put them in a .env in the root. Install Run poetry run python -m trtmp Commands Currently, TRTMP has 2 commands. To request more features and commands, talk to usin @CallsMusicChat. Note: Commands are triggered with the “/” prefix. stream As you may […]

Read more

A simple speech jammer using auditory delayed feedback for raspberry pi

A simple speech jammer using auditory delayed feedback for raspberry pi This script is intended to work on a Raspberry Pi device running Raspberry Pi OS.You’ll also need a usb sound card with a microphone, headset and any type of bluetooth gamepad/controller to make it work. -Install EVDEV and find your bluetooth controller name and button codes using this tutorial: https://raspberry-valley.azurewebsites.net/Map-Bluetooth-Controller-using-Python/ -Disable HDMI and default audio output on Raspberry Pi OS so the script can correctly find your USB sound […]

Read more

AV evading OSX Backdoor and Crypter Framework

OSripper is a fully undetectable Backdoor generator and Crypter which specialises in OSX M1 malware. Even though it specialises in OSX malware it also works well for generating windows malware. It now not only generates normal unix executables but also .apps. Description OSripper not only generates backdoors but also obfuscates and compiles them. This also includes apple M1 backdoors. Take a closer look at the Roadmap to see how close we are to achieving our goal of total evasion but […]

Read more

Experimental Python implementation of OpenVINO Inference Engine (very slow, limited functionality)

Description The PyOpenVINO is a spin-off product from my deep learning algorithm study work. This project is aiming at neither practical performance nor rich functionalities.PyOpenVINO can load an OpenVINO IR model (.xml/.bin) and run it.The implementation is quite straightforward and naive. No Optimization technique is used. Thus, the code is easy to read and modify.Supported API is quite limited, but it mimics OpenVINO IE Python API. So, you can easily read and modify the sample code too. Developed as a […]

Read more

Structure Extraction in Task-Oriented Dialogues with Slot Clustering

This is the official code repository for the paper Structure Extraction in Task-Oriented Dialogues with Slot Clustering by Liang Qiu, Chien-Sheng Wu, Wenhao Liu and Caiming Xiong. Abstract Extracting structure information from dialogue data can help us better understand user and system behaviors. In task-oriented dialogues, dialogue structure has often been considered as transition graphs among dialogue states. However, annotating dialogue states manually is expensive and time-consuming. In this paper, we propose a simple yet effective approach for structure extraction […]

Read more

Back To Reality: Weak-supervised 3D Object Detection with Shape-guided Label Enhancement

Introduction This repo contains PyTorch implementation for paper Back To Reality: Weak-supervised 3D Object Detection with Shape-guided Label Enhancement (CVPR2022) @inproceedings{xu2022br, author = {Xu, Xiuwei and Wang, Yifan and Zheng, Yu and Rao, Yongming and Lu, Jiwen and Zhou, Jie}, title = {Back To Reality: Weak-supervised 3D Object Detection with Shape-guided Label Enhancement}, booktitle = {IEEE Conference on Computer Vision and Pattern Recognition (CVPR)}, year = {2022}    

Read more

Webmin CVE-2022-0824 Post-Auth Reverse Shell

Vulnerability Description Webmin 1.984 and below – File Manager privilege exploit (CVE-2022-0824 and CVE-2022-0829)Less privileged Webmin users who do not have any File Manager module restrictions configured can access files with root privileges, if using the default Authentic theme. All systems with additional untrusted Webmin users should upgrade immediately. Note that Virtualmin systems are not effected by this bug, due to the way domain owner Webmin users are configured.Source: https://www.webmin.com/security.html Exploit Description This exploit takes advantage of the post-auth Improper […]

Read more
1 217 218 219 220 221 935