- Kraków, Poland
-
23:42
(UTC +01:00) - melkam.dev
- in/mellkam
- https://t.me/mellkam
Stars
🤗 Transformers: the model-definition framework for state-of-the-art machine learning models in text, vision, audio, and multimodal models, for both inference and training.
Tensors and Dynamic neural networks in Python with strong GPU acceleration
🥧 HTTPie CLI — modern, user-friendly command-line HTTP client for the API era. JSON support, colors, sessions, downloads, plugins & more.
Python packaging and dependency management made easy
💫 Industrial-strength Natural Language Processing (NLP) in Python
Certbot is EFF's tool to obtain certs from Let's Encrypt and (optionally) auto-enable HTTPS on your server. It can also act as a client for any other CA that uses the ACME protocol.
The fundamental package for scientific computing with Python.
🦔 PostHog is an all-in-one developer platform for building successful products. We offer product analytics, web analytics, session replay, error tracking, feature flags, experimentation, surveys, d…
Real-time face swap for PC streaming or video calls
Make Your Company Data Driven. Connect to any data source, easily visualize, dashboard and share your data.
SoftVC VITS Singing Voice Conversion
This is a fun, new monospaced font that includes programming ligatures and is designed to enhance the modern look and feel of the Windows Terminal.
OpenAI Baselines: high-quality implementations of reinforcement learning algorithms
Best DDoS Attack Script Python3, (Cyber / DDos) Attack With 56 Methods
DALL·E Mini - Generate images from a text prompt
Source code for Twitter's Recommendation Algorithm
A monospaced programming font inspired by the Minecraft typeface
VITS: Conditional Variational Autoencoder with Adversarial Learning for End-to-End Text-to-Speech
Stalk your Friends. Find their Instagram, FB and Twitter Profiles using Image Recognition and Reverse Image Search.
DDos Ripper a Distributable Denied-of-Service (DDOS) attack server that cuts off targets or surrounding infrastructure in a flood of Internet traffic
A simple and well styled PPO implementation. Based on my Medium series: https://medium.com/@eyyu/coding-ppo-from-scratch-with-pytorch-part-1-4-613dfc1b14c8.
Using Socks4/5 or http proxies to make a multithreading Http-flood/Https-flood (cc) attack.
The source code for the blog post The 37 Implementation Details of Proximal Policy Optimization
Performant and accurate speech recognition built on Pytorch
N-gram keyword extraction using spaCy and pretrained language models