A Python Toolbox for Statistics and Neurophysiological Signal Processing (EEG, EDA, ECG, EMG...).
Support
Quality
Security
License
Reuse
Public open-source code of malware Stuxnet (aka MyRTUs).
Support
Quality
Security
License
Reuse
Distributed version-control for geospatial and tabular data
Support
Quality
Security
License
Reuse
Pysolar is a collection of Python libraries for simulating the irradiation of any point on earth by the sun. It includes code for extremely precise ephemeris calculations.
Support
Quality
Security
License
Reuse
Datasets and tools for basic natural language processing.
Support
Quality
Security
License
Reuse
Dataset Condensation (ICLR21 and ICML21)
Support
Quality
Security
License
Reuse
Molecular Processing Made Easy.
Support
Quality
Security
License
Reuse
Web-based molecule sketcher
Support
Quality
Security
License
Reuse
An interactive tool for exploring large, tabular datasets.
Support
Quality
Security
License
Reuse
Project for identifying executables and DLLs vulnerable to relative path DLL hijacking.
Support
Quality
Security
License
Reuse
在 Android 上绘制思维导图控件,让思维更简单。
Support
Quality
Security
License
Reuse
a
awesome-industrial-machine-datasetsby makinarocks
Jupyter Notebook 324 Version:Current License: No License (No License)
Support
Quality
Security
License
Reuse
Just a Christmas tree
Support
Quality
Security
License
Reuse
A (hopefully) generic unpacker for packed Android apps.
Support
Quality
Security
License
Reuse
Projeto de data science para imersão dados
Support
Quality
Security
License
Reuse
an interactive, animated COVID-19 coronavirus map to track the outbreak over time by country and by region for selected countries
Support
Quality
Security
License
Reuse
It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography methods. For this reason, it does not cause any distortion in the JPG file. The JPG file size and payload do not have to be proportional.The JPG file is displayed normally in any viewing application or web application. It can bypass various security programs such as firewall, antivirus. If the file is examined in detail, it is easier to detect than steganography methods. However, since the payload in the JPG file is encrypted, it cannot be easily decrypted. It also uses the "garbage code insertion/dead-code insertion" method to prevent the payload from being caught by the antivirus at runtime.
Support
Quality
Security
License
Reuse
Excess mortality during COVID-19 pandemic
Support
Quality
Security
License
Reuse
X86 Mutation Engine with Portable Executable compatibility.
Support
Quality
Security
License
Reuse
A Python interface to map GRIB files to the NetCDF Common Data Model following the CF Convention using ecCodes
Support
Quality
Security
License
Reuse
Open Data Structures (in Rust)
Support
Quality
Security
License
Reuse
A Python Package for Protein Dynamics Analysis
Support
Quality
Security
License
Reuse
Sandbox for automated Linux malware analysis.
Support
Quality
Security
License
Reuse
YASA (Yet Another Spindle Algorithm): a Python package to analyze polysomnographic sleep recordings.
Support
Quality
Security
License
Reuse
Human 3.6M 3D human pose dataset fetcher
Support
Quality
Security
License
Reuse
g
geopandas-tutorialby jorisvandenbossche
Jupyter Notebook 316 Version:Current License: Permissive (BSD-3-Clause)
Tutorial on geospatial data manipulation with Python
Support
Quality
Security
License
Reuse
[COLING 2022] CSL: A Large-scale Chinese Scientific Literature Dataset 中文科学文献数据集
Support
Quality
Security
License
Reuse
Deal with bad samples in your dataset dynamically, use Transforms as Filters, and more!
Support
Quality
Security
License
Reuse
Avogadro libraries provide 3D rendering, visualization, analysis and data processing useful in computational chemistry, molecular modeling, bioinformatics, materials science, and related areas.
Support
Quality
Security
License
Reuse
Spans, a powerful concept
Support
Quality
Security
License
Reuse
Core repo for
Support
Quality
Security
License
Reuse
:sparkles: 基于Vue的拖拽组织树:evergreen_tree:
Support
Quality
Security
License
Reuse
A simple Python => MATLAB(R) interface and a matlab_magic for ipython
Support
Quality
Security
License
Reuse
Please use the he-tree-vue, vue-draggable-nested-tree will no longer be maintained.
Support
Quality
Security
License
Reuse
Support
Quality
Security
License
Reuse
Python framework for short-term ensemble prediction systems.
Support
Quality
Security
License
Reuse
pure-Python (Numpy optional) 3D coordinate conversions for geospace ecef enu eci
Support
Quality
Security
License
Reuse
A tree structure for Mongoid documents using the materialized path pattern
Support
Quality
Security
License
Reuse
c
cowin-vaccination-slot-availabilityby bhattbhavesh91
Jupyter Notebook 306 Version:Current License: Permissive (Apache-2.0)
Script to check the available slots for Covid-19 Vaccination Centers from CoWIN API in India.
Support
Quality
Security
License
Reuse
A purely functional red-black tree data structure
Support
Quality
Security
License
Reuse
Real-time updates and information about key SARS-CoV-2 variants, plus the scripts that generate this information.
Support
Quality
Security
License
Reuse
Cross-platform Yara scanner written in Go
Support
Quality
Security
License
Reuse
Ruby/Numo::NArray - New NArray class library
Support
Quality
Security
License
Reuse
Repository of modules and signatures contributed by the community
Support
Quality
Security
License
Reuse
Human-Powered Data Analysis with Mechanical Turk
Support
Quality
Security
License
Reuse
A simple IO library for using Clojure's reducers
Support
Quality
Security
License
Reuse
A General Purpose Tree Data Structure for Ruby
Support
Quality
Security
License
Reuse
Epidemiological Data from the COVID-19 Epidemic in Canada
Support
Quality
Security
License
Reuse
IDPS & SandBox & AntiVirus STEALTH KILLER. MorphAES is the world's first polymorphic shellcode engine, with metamorphic properties and capability to bypass sandboxes, which makes it undetectable for an IDPS, it's cross-platform as well and library-independent.
Support
Quality
Security
License
Reuse
Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into categories for ease of searching and understanding. Also provided are code samples, signature recommendations and countermeasures within each category for the described techniques.
Support
Quality
Security
License
Reuse
N
NeuroKit.pyby neuropsychology
A Python Toolbox for Statistics and Neurophysiological Signal Processing (EEG, EDA, ECG, EMG...).
Python 336Updated: 1 y ago License: Permissive (MIT)
Support
Quality
Security
License
Reuse
s
stuxnetby research-virus
Public open-source code of malware Stuxnet (aka MyRTUs).
C 335Updated: 2 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
k
kartby koordinates
Distributed version-control for geospatial and tabular data
Python 334Updated: 1 y ago License: Proprietary (Proprietary)
Support
Quality
Security
License
Reuse
p
pysolarby pingswept
Pysolar is a collection of Python libraries for simulating the irradiation of any point on earth by the sun. It includes code for extremely precise ephemeris calculations.
Jupyter Notebook 333Updated: 1 y ago License: Strong Copyleft (GPL-3.0)
Support
Quality
Security
License
Reuse
l
language-resourcesby google
Datasets and tools for basic natural language processing.
C++ 332Updated: 2 y ago License: Permissive (Apache-2.0)
Support
Quality
Security
License
Reuse
D
DatasetCondensationby VICO-UoE
Dataset Condensation (ICLR21 and ICML21)
Python 330Updated: 1 y ago License: Permissive (MIT)
Support
Quality
Security
License
Reuse
d
datamolby datamol-io
Molecular Processing Made Easy.
Python 328Updated: 2 y ago License: Permissive (Apache-2.0)
Support
Quality
Security
License
Reuse
k
ketcherby epam
Web-based molecule sketcher
TypeScript 327Updated: 1 y ago License: Permissive (Apache-2.0)
Support
Quality
Security
License
Reuse
d
datacombby cmpolis
An interactive tool for exploring large, tabular datasets.
JavaScript 326Updated: 4 y ago License: Permissive (MIT)
Support
Quality
Security
License
Reuse
w
windows-dll-hijackingby wietze
Project for identifying executables and DLLs vulnerable to relative path DLL hijacking.
Python 325Updated: 2 y ago License: Strong Copyleft (GPL-3.0)
Support
Quality
Security
License
Reuse
T
ThinkMapby owant
在 Android 上绘制思维导图控件,让思维更简单。
Java 324Updated: 2 y ago License: Permissive (Apache-2.0)
Support
Quality
Security
License
Reuse
a
awesome-industrial-machine-datasetsby makinarocks
Jupyter Notebook 324Updated: 2 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
C
ChristBASHTreeby sergiolepore
Just a Christmas tree
Shell 323Updated: 2 y ago License: Permissive (Unlicense)
Support
Quality
Security
License
Reuse
a
android_unpackerby CheckPointSW
A (hopefully) generic unpacker for packed Android apps.
Shell 323Updated: 3 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
i
imersaodados3by alura-cursos
Projeto de data science para imersão dados
Jupyter Notebook 321Updated: 3 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
c
covid19by stevenliuyi
an interactive, animated COVID-19 coronavirus map to track the outbreak over time by country and by region for selected countries
JavaScript 320Updated: 2 y ago License: Permissive (MIT)
Support
Quality
Security
License
Reuse
J
JPGtoMalwareby abdulkadir-gungor
It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography methods. For this reason, it does not cause any distortion in the JPG file. The JPG file size and payload do not have to be proportional.The JPG file is displayed normally in any viewing application or web application. It can bypass various security programs such as firewall, antivirus. If the file is examined in detail, it is easier to detect than steganography methods. However, since the payload in the JPG file is encrypted, it cannot be easily decrypted. It also uses the "garbage code insertion/dead-code insertion" method to prevent the payload from being caught by the antivirus at runtime.
Python 320Updated: 2 y ago License: Proprietary (Proprietary)
Support
Quality
Security
License
Reuse
e
excess-mortalityby dkobak
Excess mortality during COVID-19 pandemic
Jupyter Notebook 319Updated: 2 y ago License: Strong Copyleft (GPL-3.0)
Support
Quality
Security
License
Reuse
p
persesby mike1k
X86 Mutation Engine with Portable Executable compatibility.
C++ 319Updated: 2 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
c
cfgribby ecmwf
A Python interface to map GRIB files to the NetCDF Common Data Model following the CF Convention using ecCodes
Python 318Updated: 2 y ago License: Permissive (Apache-2.0)
Support
Quality
Security
License
Reuse
o
Support
Quality
Security
License
Reuse
P
ProDyby prody
A Python Package for Protein Dynamics Analysis
Python 316Updated: 1 y ago License: Proprietary (Proprietary)
Support
Quality
Security
License
Reuse
L
LiSaby danieluhricek
Sandbox for automated Linux malware analysis.
Python 316Updated: 2 y ago License: Permissive (Apache-2.0)
Support
Quality
Security
License
Reuse
y
yasaby raphaelvallat
YASA (Yet Another Spindle Algorithm): a Python package to analyze polysomnographic sleep recordings.
Python 316Updated: 1 y ago License: Permissive (BSD-3-Clause)
Support
Quality
Security
License
Reuse
h
h36m-fetchby anibali
Human 3.6M 3D human pose dataset fetcher
Python 316Updated: 2 y ago License: Permissive (Apache-2.0)
Support
Quality
Security
License
Reuse
g
geopandas-tutorialby jorisvandenbossche
Tutorial on geospatial data manipulation with Python
Jupyter Notebook 316Updated: 3 y ago License: Permissive (BSD-3-Clause)
Support
Quality
Security
License
Reuse
C
CSLby ydli-ai
[COLING 2022] CSL: A Large-scale Chinese Scientific Literature Dataset 中文科学文献数据集
Python 315Updated: 2 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
n
nonechucksby msamogh
Deal with bad samples in your dataset dynamically, use Transforms as Filters, and more!
Python 314Updated: 3 y ago License: Permissive (MIT)
Support
Quality
Security
License
Reuse
a
avogadrolibsby OpenChemistry
Avogadro libraries provide 3D rendering, visualization, analysis and data processing useful in computational chemistry, molecular modeling, bioinformatics, materials science, and related areas.
C++ 314Updated: 2 y ago License: Permissive (BSD-3-Clause)
Support
Quality
Security
License
Reuse
s
spansby flavienlaurent
Spans, a powerful concept
Java 313Updated: 4 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
a
Support
Quality
Security
License
Reuse
v
vue-drag-treeby wangdabaoqq
:sparkles: 基于Vue的拖拽组织树:evergreen_tree:
JavaScript 311Updated: 2 y ago License: Permissive (MIT)
Support
Quality
Security
License
Reuse
p
python-matlab-bridgeby arokem
A simple Python => MATLAB(R) interface and a matlab_magic for ipython
Python 310Updated: 4 y ago License: Permissive (BSD-2-Clause)
Support
Quality
Security
License
Reuse
v
vue-draggable-nested-treeby phphe
Please use the he-tree-vue, vue-draggable-nested-tree will no longer be maintained.
JavaScript 310Updated: 3 y ago License: Permissive (MIT)
Support
Quality
Security
License
Reuse
P
PubTabNetby ibm-aur-nlp
Jupyter Notebook 310Updated: 2 y ago License: Proprietary (Proprietary)
Support
Quality
Security
License
Reuse
p
pystepsby pySTEPS
Python framework for short-term ensemble prediction systems.
Python 309Updated: 2 y ago License: Permissive (BSD-3-Clause)
Support
Quality
Security
License
Reuse
p
pymap3dby geospace-code
pure-Python (Numpy optional) 3D coordinate conversions for geospace ecef enu eci
Python 308Updated: 2 y ago License: Permissive (BSD-2-Clause)
Support
Quality
Security
License
Reuse
m
mongoid-treeby benedikt
A tree structure for Mongoid documents using the materialized path pattern
Ruby 308Updated: 4 y ago License: Permissive (MIT)
Support
Quality
Security
License
Reuse
c
cowin-vaccination-slot-availabilityby bhattbhavesh91
Script to check the available slots for Covid-19 Vaccination Centers from CoWIN API in India.
Jupyter Notebook 306Updated: 3 y ago License: Permissive (Apache-2.0)
Support
Quality
Security
License
Reuse
f
functional-red-black-treeby mikolalysenko
A purely functional red-black tree data structure
JavaScript 305Updated: 4 y ago License: Permissive (MIT)
Support
Quality
Security
License
Reuse
c
covariantsby hodcroftlab
Real-time updates and information about key SARS-CoV-2 variants, plus the scripts that generate this information.
Python 305Updated: 2 y ago License: Strong Copyleft (AGPL-3.0)
Support
Quality
Security
License
Reuse
k
krakenby botherder
Cross-platform Yara scanner written in Go
Go 305Updated: 2 y ago License: Strong Copyleft (GPL-3.0)
Support
Quality
Security
License
Reuse
n
numo-narrayby ruby-numo
Ruby/Numo::NArray - New NArray class library
C 305Updated: 3 y ago License: Permissive (BSD-3-Clause)
Support
Quality
Security
License
Reuse
c
communityby cuckoosandbox
Repository of modules and signatures contributed by the community
Python 304Updated: 2 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
c
clockworkravenby twitter-archive
Human-Powered Data Analysis with Mechanical Turk
Ruby 303Updated: 4 y ago License: Permissive (Apache-2.0)
Support
Quality
Security
License
Reuse
i
iotaby thebusby
A simple IO library for using Clojure's reducers
Java 302Updated: 3 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
R
RubyTreeby evolve75
A General Purpose Tree Data Structure for Ruby
Ruby 302Updated: 3 y ago License: Proprietary (Proprietary)
Support
Quality
Security
License
Reuse
C
Covid19Canadaby ccodwg
Epidemiological Data from the COVID-19 Epidemic in Canada
R 302Updated: 3 y ago License: Permissive (CC-BY-4.0)
Support
Quality
Security
License
Reuse
M
MorphAESby cryptolok
IDPS & SandBox & AntiVirus STEALTH KILLER. MorphAES is the world's first polymorphic shellcode engine, with metamorphic properties and capability to bypass sandboxes, which makes it undetectable for an IDPS, it's cross-platform as well and library-independent.
Python 301Updated: 2 y ago License: Permissive (MIT)
Support
Quality
Security
License
Reuse
E
Evasionsby CheckPointSW
Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into categories for ease of searching and understanding. Also provided are code samples, signature recommendations and countermeasures within each category for the described techniques.
HTML 301Updated: 2 y ago License: Permissive (MIT)
Support
Quality
Security
License
Reuse