Showing 7 open source projects for "method"

View related business solutions
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 1

    http-proxy-tunnel

    Create nested tunnels through HTTP proxies

    Http-proxy-tunnel creates TCP tunnels through http proxies that permit the CONNECT method. It differs from other proxy tunnelling programs in that it can tunnel through multiple proxies, and can use SSL tunnels. These abilities mean that in combination with a web server that can proxy (such as Apache) you can serve normal web pages from ports 80 and 443 and connect to the server (using ssh say) via those ports at the same time.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 2
    Age and Gender Estimation

    Age and Gender Estimation

    Keras implementation of a CNN network for age and gender estimation

    ...We pose the age regression problem as a deep classification problem followed by a softmax expected value refinement and show improvements over direct regression training of CNNs. Our proposed method, Deep EXpectation (DEX) of apparent age, first detects the face in the test image and then extracts the CNN predictions from an ensemble of 20 networks on the cropped face.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    netool toolkit 4.6

    netool toolkit 4.6

    MitM pentesting opensource toolkit

    ...Rootsector module allows you to automate some attacks over DNS_SPOOF + MitM (phishing - social engineering) using metasploit, apache2 and ettercap frameworks. Like the generation of payloads, shellcode, backdoors delivered using dns_spoof and MitM method to redirect a target to your phishing webpage. recent as introducted the scanner inurlbr (by cleiton)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    MultiPlink

    MultiPlink

    [UPDATE 28-10-2015] FINAL MULTIPLINK SSH LIFETIME v2.0 UP-5 "FAREWELL"

    Download Link Utama: http://sourceforge.net/projects/multiplink/files/Final_MultiPlink_SSHLIFETIME_2.0_UP-5_FAREWELL.rar/download Jika di Halaman Download, Link belum tersedia, klik link alternatif : https://www.dropbox.com/s/znptxp2gxhihpax/Final_MultiPlink_SSHLIFETIME_2.0_UP-5_FAREWELL.rar?dl=0 Lalu Download & Install juga Minor...
    Downloads: 0 This Week
    Last Update:
    See Project
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 5
    This is the official homepage of PyURLSnooper, a program written to help users locate the urls of audio and video files so that they can be recorded. This is a OS independent equivalent of URL Snooper from http://www.donationcoder.com/ (similar to https://sourceforge.net/projects/mediasniffer/). Can be used in combination with RTMPDump (http://rtmpdump.mplayerhq.hu/) in order to capture streams.
    Leader badge
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    Qualm is a graphical tool for persistent resource management. While Qualm is initially aimed at providing an entirely new method of doing disk quota management, qualm can be used for managing any persistent finite resource.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    6bed4

    zeroconfig IPv6 tunnel

    ...Such IPv6 implementation could be arranged on the fly with a tunnel mechanism that does not rely on router co-operation or manual configuration. This specification details such a method of embedding IPv6 into UDP and IPv4. It employs embedded Router Solicitation to configure the tunnel's public IPv6 address, and Neighbor Discovery to try to find the remote peer over more efficient IPv4 routes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB