dancyuser's Stars
SE-adm/Book
tomeshnet/p2p-internet-workshop
Building the Peer-to-Peer Internet workshop series
soxoj/counter-osint-guide-ru
Исчерпывающее руководство по приватности и контр-ОСИНТ для Рунета и всего СНГ 🇷🇺
rapid7/metasploitable3
Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.
brimstone/metasploitable3
Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.
luthfi11/Graphology-RSVM
My bachelor degree final project, graphology with reduced support vector machines (RSVM) method.
luccitan/graphology-communities
OBSOLETE : see graphology/graphology-communities-louvain & graphology/graphology-metrics
sim51/graphology-neo4j
Create a graphology Graph from cypher queries
jesusmartinoza/Graphology-Machine-Learning
✍️Handwriting Analysis using Graphology & Machine Learning
priya-dwivedi/Deep-Learning
titangrit/ml-graphology
Psychological analysis based on handwriting pattern with machine learning (SVM).
safvanck/Handwriting-Analysis-for-Detection-of-Personality-Traits
Handwriting Analysis for Detection of Personality Traits
wb-08/RCL
recognize cyrillic letter