The scripts used for the project of ‘Assembly of a pan-genome for global cattle reveals missing sequence and novel structural variation

These are the scripts used for the project of ‘Assembly of a pan-genome for global cattle reveals missing sequence and novel structural variation, providing new insights into their diversity and evolution history’. The Deletion list needs to be constructed. We used the results of four software, retaining 50bp to 50 Mbp, at least two software-supported SV (overlapping 80%).First, The result files generated by the four software programs was normalized to extract the breakpoint information of SV.Then, integrate the results of […]

Read more

Dual languaged (rus+eng) tool for packing and unpacking archives of Silky Engine

English Dual languaged (rus+eng) GUI tool for packing and unpacking archives of Silky Engine. It is not the same arc as used in Ai6WIN. If you want to work with Silky Engine’s .mes scripts, use mesScriptAsseAndDisassembler instead. Why this tool was created, if there are other tools that can work with this type of archive? The answer is simple: because there was no actually good enough tools. One tool can only extract the data, other — only pack, but without […]

Read more

Telegram Bot to save Posts or Files that can be Accessed via Special Links

Bot Telegram untuk menyimpan Posting atau File yang dapat Diakses melalui Link Khusus. Jika Anda memerlukan tambahan module lagi dalam repo atau Jika Anda menemukan bug, silahkan report di group @OkaeriUserbot Features Sepenuhnya dapat dicustom. Pesan sambutan & Forcesub yang dapat dicustom. Lebih dari satu Posting dalam Satu Link (batch). Dapat di-deploy di heroku secara langsung. Setup Tambahkan bot ke Channel Database dengan semua izin admin Tambahkan bot ke Channel ForceSub tambahkan bot sebagai ADMIN Tambahkan bot ke Group ForceSub […]

Read more

MIDI-DDSP: Detailed Control of Musical Performance via Hierarchical Modeling

Demos | Blog Post| Colab Notebook| Paper | MIDI-DDSP is a hierarchical audio generation model for synthesizing MIDI expandedfrom DDSP. Links Install MIDI-DDSP You could install MIDI-DDSP via pip, which allows you to use thecool Command-line MIDI synthesis to synthesize your MIDI. To install MIDI-DDSP via pip, simply run: Train MIDI-DDSP To train MIDI-DDSP, please first install midi-ddsp and clone the MIDI-DDSP repository: git clone https://github.com/magenta/midi-ddsp.git For dataset, please download the tfrecord    

Read more

Small binja plugin to import header file to types

Author: matteyeux Import header file to Binary Ninja types view Description: Binary Ninja plugin to import types from C header file (.h) to types view Installation Instructions Darwin Clone this repository into ~/Library/Application Support/Binary Ninja/plugins/ Windows Clone this repository into %APPDATA%/Binary Ninja/plugins/ Linux Clone this repository into ~/.binaryninja/plugins/ Minimum Version This plugin requires the following minimum version of Binary Ninja: License This plugin is released under a MIT license. Metadata Version 2 GitHub View    

Read more

Zalo AI challenge 2021 task hum to song

pipeline: Chuẩn bị dữ liệu cho quá trình train: python preprocessing.py python utils/split_train_val_by_id.py python utils/augment_mp3.py python utils/preprocess_augment.py Train model: python convert_data.py python train.py Infer public test: Đặt dữ liệu mp3 thô ở địa chỉ /data/public_test (bên trong chứa 2 thư mục full_song và hum) Chạy lần lượt các lệnh sau: ./predict.sh Infer private test: Đặt dữ liệu mp3    

Read more

ADCS cert template modification and ACL enumeration

This tool is designed to aid an operator in modifying ADCS certificate templates so that a created vulnerable state can be leveraged for privilege escalation (and then reset the template to its previous state afterwards). This is specifically designed for a scenario where WriteProperty rights over a template have been compromised, but the operator is unsure which properties the right applies to. In this scenairo, the template’s ACL can be queried and the applicable ACE information can be cross-referenced with […]

Read more

Cve-2021-22005-exp

0x01 漏洞简介 2021年9月21日,VMware发布安全公告,公开披露了vCenter Server中的19个安全漏洞,这些漏洞的CVSSv3评分范围为4.3-9.8。 其中,最为严重的漏洞为vCenter Server 中的任意文件上传漏洞(CVE-2021-22005),该漏洞存在于vCenter Server的分析服务中,其CVSSv3评分为 9.8。能够网络访问vCenter Server 上的 443 端口的攻击者可以通过上传恶意文件在 vCenter Server 上远程执行代码。该漏洞无需经过身份验证即可远程利用,攻击复杂度低,且无需用户交互。 0x02 影响范围 vCenter Server 7.0 < 7.0 U2c build-18356314 vCenter Server 6.7 < 6.7 U3o build-18485166 Cloud Foundation (vCenter Server) 4.x < KB85718 (4.3) Cloud Foundation (vCenter Server) 3.x < KB85719 (3.10.2.2) 6.7 vCenters Windows版本不受影响 0x03 漏洞分析 https://xz.aliyun.com/t/10524 https://testbnull.medium.com/quick-note-of-vcenter-rce-cve-2021-22005-4337d5a817ee 0x04 使用说明 注意:本exp只能打目标为Linux版本的vCenter。 帮助说明

Read more
1 307 308 309 310 311 928