- 55
- 107 357
Amanda Szampias
Приєднався 15 лис 2012
HeadHunter.py: Python Code for AWS Face Rekognition
Find people in face masks, sunglasses, low quality images, hats, and different hair styles using AWS Rekognition. HeadHunter takes an image (or sets of images) and identifies the same face in other photos. Options include Face-To-Face, Person-To-Face, and People-To-Face.
This program also has a Detect-Labels and OCR feature. Detect-Labels will find common objects like cars, drugs, alcohol, weed, injections, pills, guns, knifes, hammers, weapons, and more. OCR will take one image and parse text from it.
Github Link: github.com/ASzampiasSWD/headhunter-aws
This program also has a Detect-Labels and OCR feature. Detect-Labels will find common objects like cars, drugs, alcohol, weed, injections, pills, guns, knifes, hammers, weapons, and more. OCR will take one image and parse text from it.
Github Link: github.com/ASzampiasSWD/headhunter-aws
Переглядів: 158
Відео
HeadHunt.py Python Code for Microsoft Azure FaceAPI. Person-To-Face and Face-To-Face Identification
Переглядів 1562 роки тому
This python script uses Microsoft Azure FaceAPI for Person-To-Face and Face-To-Face comparision. Github Link: github.com/ASzampiasSWD/headhunter
Salesforce Case Swarming in Slack - Node.js
Переглядів 1,2 тис.2 роки тому
github.com/ASzampiasSWD/slack-examples/tree/main/Case Swarming
Convert IP Addresses to Google Earth KML Files: Go Edition
Переглядів 4933 роки тому
Github Link: github.com/ASzampiasSWD/ip-locator-go
Coding Slash Commands in Slack with Node.js
Переглядів 2,6 тис.3 роки тому
Coding Slash Commands in Slack with Node.js
Convert IP Addresses to Google Earth KML Files
Переглядів 3,1 тис.3 роки тому
Github Link: github.com/ASzampiasSWD/ip-locator
ElasticSearch React/Node Project Tutorial - Part 2
Переглядів 2 тис.3 роки тому
ElasticSearch React/Node Project Tutorial - Part 2
Using ElasticSearch for Breached Databases
Переглядів 2683 роки тому
Using ElasticSearch for Breached Databases
Expose Salesforce REST API to the Public Unauthenticated
Переглядів 2,8 тис.3 роки тому
1. Make sure your community is public via Builder - Settings - General 2. Click on the Guest User Profile - Enable API REST Services and Salesforce API Calls. - Add your REST Apex Class. - Add the objects your working with. 3. (optional) sometimes change "with sharing" to "without sharing" in code. Blog on this topic: developer.salesforce.com/blogs/developer-relations/2012/02/quick-tip-public-r...
Executable Files Windows Privilege Escalation - Jutsu #11
Переглядів 1833 роки тому
Executable Files Windows Privilege Escalation - Jutsu #11
Regsvc ACL Windows Privilege Escalation - Jutsu #10
Переглядів 1683 роки тому
Regsvc ACL Windows Privilege Escalation - Jutsu #10
RunAs Windows Privilege Escalation - Jutsu #8
Переглядів 2253 роки тому
RunAs Windows Privilege Escalation - Jutsu #8
Always Install Elevated Windows Privilege Escalation - Jutsu #9
Переглядів 4153 роки тому
Always Install Elevated Windows Privilege Escalation - Jutsu #9
Implement VLookup Validation Rule in Salesforce Zip Codes
Переглядів 1,8 тис.4 роки тому
Implement VLookup Validation Rule in Salesforce Zip Codes
How to make a Timeline Chart in Einstein Analytics
Переглядів 7444 роки тому
How to make a Timeline Chart in Einstein Analytics
Inject Scoring Engine Easy Install Instructions
Переглядів 514 роки тому
Inject Scoring Engine Easy Install Instructions
Remove Login Boxes and Shutdown CloudCraze: Coronavirus Edition
Переглядів 2124 роки тому
Remove Login Boxes and Shutdown CloudCraze: Coronavirus Edition
Thanks Amanda!
Thanks Amanda.
great stuff.... keep it up
I can't watch it, but I can't take it down either. The board is very cute, at least.
i have subscribed your channel amanda ,thanks for the video
Congratulations!!!
Nice asmr
People like this is why no one can game anymore we get it opening every port on ur router leads to disaster tbh you shouldn't even be port forwarding in the first place if u don't understand how it works now every gamer on the planet is suffering from horrible lag because karens ruin literally everything so thanks Karen for ruining everyone's GAMING career
Thanks Amanda
Sorry i’m a bit confused on how you were able to access Hermione’s PC from Snape?
Literally a best video i watched on SMB Relay attack mam..thank you mam..this will help me in my PNPT Prep :)
TANK YOU for your support.
wow
why can't my centos server ping the internet with the same process
you make à mistake . in one commande. be careful
lol XD
Damn, i am super lost.
thanks
No way I watched this and didn’t realize who made it until the end. Am trying to solve this exact problem.
PERFECT 💞💞💞💞💘💘💙💙
ntLM not ntML
welcome 2023 new subscriber here
nice GitHub virus
ITS A VIRUS
Thank you! That's helpful.
i hope live there 💔💔
Thank you for your video. This is something I need to brush up on
post your github link in the description
hi madam I am gonna ask someting about server ports example there is a server here and I want to scan their host to get server ports but server have anti ping or someting if I do a nmap scan it all down and no response all servers and no solituon expect 3306 port how can we find ports then this happen ?
There can be a firewall solution, which could make some port inaccessible. If nmap shows only 3306 open, it could mean that only that one (likely SQL service) is directly available. This video, is nothing related to that, though. :)
@@mach1ne722 thanks mam
My windows server doesnt have this feature xD
Thank you Amanda, good explanation. It was very helpful for me.
Woah I love Naruto too
.
how to use @slack/bolt. but in this file not any use @slack/bolt.. please help me...
our app not work here
congrats, keep hacking :)
You are literally the definition of a wiz kid
Biggest problem is to find real ip of website hosting server or Web server which are usually behind WAF like Cloudflare Or Akamai. Please help about this real practical problem. Thanks in advance for your kind support. 😊
Please make beginner 2 advance level practical live website bug hunting, live website penetration testing, live website exploitation content video series... 🙏 😊 💯✌❤💚💙💜😍😘🤝
Thanks for interesting content, great refresher. Currently learning networking, and wanting to eventually pivot from helpdesk to networking to security
Great job. Keep working hard.
Hello, did you use @slack/bolt?
Yep
@@amandaszampias5006 No you didn't. The only import from @slack/bolt is "App" which is not used at all in the coding below. You might aswell delete the first line of the coding and the app would do same. If you use bolt you don't need express and vince versa
i love you
And where is the part 1.
Congratulations, Amanda! Well done! What's next? Cool bokken on the coach. What's that? Coldsteel?
Thanks!! Been looking for this solution. Didn't want to download another app. Keep up the good work!
Please do more videos, excellent , interesting, how is the OSCP going ? , The sound was a bit soft, Thank you looking forward to your next video.
having brave instead of firefox is illegal
anyways, didnt try it, but it look nice, thanks for making it public ;p
when u enter how you know the password for the virtualbox the one we r exploiting?
Brilliant well done indeed!!!! Regards from Swizerland