Git Product home page Git Product logo

proxify's Introduction

proxify

FeaturesInstallationUsageRunning ProxifyInstalling SSL CertificateApplications of ProxifyJoin Discord

Swiss Army Knife Proxy for rapid deployments. Supports multiple operations such as request/response dump, filtering and manipulation via DSL language, upstream HTTP/Socks5 proxy. Additionally, a replay utility allows to import the dumped traffic (request/responses with correct domain name) into BurpSuite or any other proxy by simply setting the upstream proxy to proxify.

Features

proxify

  • Intercept / Manipulate HTTP/HTTPS & NON-HTTP traffic
  • Invisible & Thick clients traffic proxy support
  • TLS MITM support with client/server certificates
  • HTTP and SOCKS5 support for upstream proxy
  • Traffic Match/Filter and Replace DSL support
  • Full traffic dump to file (request/responses)
  • Native embedded DNS server
  • Plugin Support to decode specific protocols (e.g XMPP/SMTP/FTP/SSH/)
  • Proxify Traffic replay in Burp

Installation

Download the ready to run binary or install/build using GO

go install -v github.com/projectdiscovery/proxify/cmd/proxify@latest

Usage

proxify -h

This will display help for the tool. Here are all the switches it supports.

Swiss Army Knife Proxy for rapid deployments. Supports multiple operations such as request/response dump,filtering and manipulation via DSL language, upstream HTTP/Socks5 proxy

Usage:
  ./proxify [flags]

Flags:
OUTPUT:
   -sr, -store-resposne        store raw http request / response to output directory (default proxify_logs)
   -o, -output                 output file to store proxify logs (default proxify_logs.jsonl)
   -of, -output-format string  output format (jsonl/yaml) (default "jsonl")
   -dump-req                   Dump only HTTP requests to output file
   -dump-resp                  Dump only HTTP responses to output file
   -oca, -out-ca string        Generate and Save CA File to filename

UPDATE:
   -up, -update                 update proxify to latest version
   -duc, -disable-update-check  disable automatic proxify update check

FILTER:
   -req-fd, -request-dsl string[]                   Request Filter DSL
   -resp-fd, -response-dsl string[]                 Response Filter DSL
   -req-mrd, -request-match-replace-dsl string[]    Request Match-Replace DSL
   -resp-mrd, -response-match-replace-dsl string[]  Response Match-Replace DSL

NETWORK:
   -ha, -http-addr string    Listening HTTP IP and Port address (ip:port) (default "127.0.0.1:8888")
   -sa, -socks-addr          Listening SOCKS IP and Port address (ip:port) (default 127.0.0.1:10080)
   -da, -dns-addr string     Listening DNS IP and Port address (ip:port)
   -dm, -dns-mapping string  Domain to IP DNS mapping (eg domain:ip,domain:ip,..)
   -r, -resolver string      Custom DNS resolvers to use (ip:port)

PROXY:
   -hp, -http-proxy string[]    Upstream HTTP Proxies (eg http://proxy-ip:proxy-port)
   -sp, -socks5-proxy string[]  Upstream SOCKS5 Proxies (eg socks5://proxy-ip:proxy-port)
   -c int                       Number of requests before switching to the next upstream proxy (default 1)

EXPORT:
   -max-size int  Max export data size (request/responses will be truncated) (default 9223372036854775807)

CONFIGURATION:
   -config string              path to the proxify configuration file
   -ec, -export-config string  proxify export module configuration file (default "$CONFIG/export-config.yaml")
   -config-directory string    override the default config path (default "$CONFIG/proxify")
   -cert-cache-size int        Number of certificates to cache (default 256)
   -a, -allow string[]         Allowed list of IP/CIDR's to be proxied
   -d, -deny string[]          Denied list of IP/CIDR's to be proxied
   -pt, -passthrough string[]  List of passthrough domains

DEBUG:
   -nc, -no-color      No Color
   -version            Version
   -silent             Silent
   -v, -verbose        Verbose
   -vv, -very-verbose  Very Verbose

Running Proxify

Runs an HTTP proxy on port 8888:

proxify

Runs an HTTP proxy on custom port 1111:

proxify -http-addr ":1111"

TLS pass through

The -pt flag can be used pass through (skip) encrypted traffic without attempting to terminate the TLS connection.

proxify -pt '(.*\.)?google\.co.in.*'

Proxify with upstream proxy

Runs an HTTP proxy on port 8888 and forward the traffic to burp on port 8080:

proxify -http-proxy http://127.0.0.1:8080

Runs an HTTP proxy on port 8888 and forward the traffic to the TOR network:

proxify -socks5-proxy 127.0.0.1:9050

Dump all the HTTP/HTTPS traffic

Proxify supports three output formats: JSONL, YAML and Files.

JSONL (default):

In Json Lines format each Http Request/Response pair is stored as json object in a single line.

{"timestamp":"2024-02-20T01:56:49+05:30","url":"https://scanme.sh:443","request":{"header":{"Connection":"close","User-Agent":"curl/8.1.2","host":"scanme.sh:443","method":"CONNECT","path":"","scheme":"https"},"raw":"CONNECT scanme.sh:443 HTTP/1.1\r\nHost: scanme.sh:443\r\nConnection: close\r\nUser-Agent: curl/8.1.2\r\n\r\n"},"response":{"header":{"Content-Length":"0"},"raw":"HTTP/1.1 200 OK\r\nContent-Length: 0\r\n\r\n"}}
{"timestamp":"2024-02-20T01:56:49+05:30","url":"https://scanme.sh/","request":{"header":{"Accept":"*/*","Connection":"close","User-Agent":"curl/8.1.2","host":"scanme.sh","method":"GET","path":"/","scheme":"https"},"raw":"GET / HTTP/1.1\r\nHost: scanme.sh\r\nAccept: */*\r\nConnection: close\r\nUser-Agent: curl/8.1.2\r\n\r\n"},"response":{"header":{"Content-Type":"text/plain; charset=utf-8","Date":"Mon, 19 Feb 2024 20:26:49 GMT"},"body":"ok","raw":"HTTP/1.1 200 OK\r\nConnection: close\r\nContent-Type: text/plain; charset=utf-8\r\nDate: Mon, 19 Feb 2024 20:26:49 GMT\r\n\r\n"}}

Yaml MultiDoc:

In the YAML MultiDoc format, each HTTP request and response pair is encapsulated as a separate document.All Documents in output yaml file are seperated by --- to allow stream parsing and consumption.

proxify -output-format yaml
timestamp: "2024-02-20T01:40:40+05:30"
url: https://scanme.sh:443
request:
    header:
        Connection: close
        User-Agent: curl/8.1.2
        host: scanme.sh:443
        method: CONNECT
        path: ""
        scheme: https
    body: ""
    raw: "CONNECT scanme.sh:443 HTTP/1.1\r\nHost: scanme.sh:443\r\nConnection: close\r\nUser-Agent: curl/8.1.2\r\n\r\n"
response:
    header:
        Content-Length: "0"
    body: ""
    raw: "HTTP/1.1 200 OK\r\nContent-Length: 0\r\n\r\n"
---
timestamp: "2024-02-20T01:40:40+05:30"
...

Files:

In Files format, each HTTP request and response pair is stored in separate files with the request followed by the response. Filenames are in format of {{Host}}-{{randstr}}.txt. Additionally, dump-req or dump-resp flag can be used for saving specific part of the request to the file.

proxify -store-response

Note: When using -store-response both jsonl and files are generated.

Hostname mapping with Local DNS resolver

Proxify supports embedding DNS resolver to map hostnames to specific addresses and define an upstream dns server for any other domain name

Runs an HTTP proxy on port 8888 using an embedded dns server listening on port 53 and resolving www.google.it to 192.168.1.1 and all other fqdn are forwarded upstream to 1.1.1.1:

proxify -dns-addr ":53" -dns-mapping "www.google.it:192.168.1.1" -dns-resolver "1.1.1.1:53"

This feature is used for example by the replay utility to hijack the connections and simulate responses. It may be useful during internal assessments with private dns servers. Using * as domain name matches all dns requests.

Match/Filter traffic with DSL

If the request or response match the filters the dump is tagged with .match.txt suffix:

proxify -request-dsl "contains(request,'firefox')" -response-dsl "contains(response, md5('test'))"

Match and Replace on the fly

Proxify supports modifying Request and Responses on the fly with DSL language.

Here is an example to replace firefox word from request to chrome:

proxify -request-match-replace-dsl "replace(request,'firefox','chrome')"

Another example using regex based replacement of response:

proxify -response-match-replace-dsl "replace_regex(response, '^authentication failed$', 'authentication ok')"

Replay all traffic into burp

Replay all the dumped requests/responses into the destination URL (http://127.0.0.1:8080) if not specified. For this to work it's necessary to configure burp to use proxify as upstream proxy, as it will take care to hijack the dns resolutions and simulate the remote server with the dumped request. This allows to have in the burp history exactly all requests/responses as if they were originally sent through it, allowing for example to perform a remote interception on cloud, and merge all results locally within burp.

replay -output "logs/"

Installing SSL Certificate

A certificate authority is generated for proxify which is stored in the folder ~/.config/proxify/ as default, manually can be specified by -config flag. The generated certificate can be imported by visiting http://proxify/cacert in a browser connected to proxify.

Installation steps for the Root Certificate is similar to other proxy tools which includes adding the cert to system trusted root store.

Applications of Proxify

Proxify can be used for multiple places, here are some common example where Proxify comes handy:

👉 Storing all the burp proxy history logs locally.

Runs an HTTP proxy on port 8888 and forward the traffic to burp on port 8080:

proxify -http-proxy http://127.0.0.1:8080

From BurpSuite, set the Upstream Proxy to forward all the traffic back to proxify:

User Options > Upstream Proxy > Proxy & Port > 127.0.0.1 & 8888

Now all the request/response history will be stored in logs folder that can be used later for post-processing.

👉 Store all your browse history locally.

While you browse the application, you can point the browser to proxify to store all the HTTP request / response to file.

Start proxify on default or any port you wish,

proxify -output chrome-logs

Start Chrome browser in macOS,

/Applications/Chromium.app/Contents/MacOS/Chromium --ignore-certificate-errors --proxy-server=http://127.0.0.1:8888 &
👉 Store all the response of while you fuzz as per you config at run time.

Start proxify on default or any port you wish:

proxify -output ffuf-logs

Run FFuF with proxy pointing to proxify:

ffuf -x http://127.0.0.1:8888 FFUF_CMD_HERE

Proxify is made with 🖤 by the projectdiscovery team. Community contributions have made the project what it is. See the Thanks.md file for more details.

proxify's People

Contributors

buffalowill avatar dependabot[bot] avatar dogancanbakir avatar edoardottt avatar ehsandeep avatar forgedhallpass avatar gaby avatar hahwul avatar ice3man543 avatar kelfitas avatar kmskrishna avatar leveryd avatar luitelsamikshya avatar mjkim610 avatar mzack9999 avatar nicoandmee avatar parrasajad avatar ramanareddy0m avatar tarunkoyalwar avatar wdahlenburg avatar yonas avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

proxify's Issues

The request match and replace DSL functionality does not work

proxify -request-match-replace-dsl "replace(request,'curl','firefox')" -v -hp http://localhost:8080
curl google.com --proxy-insecure -x localhost:8888 -v -L

In the verbose output of proxify the value seems to be changed, but not the actual request.

image

image

image

parse ipaddress from output http traffic under http proxy

When use socks proxy and access "https://www.google.com" , logs output like "ipaddress_anythinghere.txt".
And i can parse info ipaddress( in file name ), Host (in file content).

But use http proxy , logs output like "domainname_anthinghere.txt", try to pare info from it , just can get Host ,usually the Host equal to domainname so i did not know the traffic send to which ipaddress (which one i want to port scan).

Proxify makes connection to denied IP

Steps to reproduce:

$ ./proxify -deny 157.240.18.0/24 # proxify
$ echo 157.240.18.34 | ./httpx -proxy http://127.0.0.1:8888/ # httpx using proxify

Expected behavior:

HTTP Proxy Listening on 127.0.0.1:8888
Socks5 Proxy Listening on 127.0.0.1:10080
Saving traffic to logs
2022/03/09 12:11:32 [002] WARN: Cannot read TLS response from mitm'd server denied address found for host

Current behaviour:
Establishes connection to denied target IP

Provide useful information around DSL signatures and parameters

Show correct DSL signatures. If a user provided an incorrect parameter that has a static type/enum value, provide all the available options.

High level example:

  • user input: contains(123)
  • expected output: "The correct method signature is contains(partToSearch Part, value string). The correct Part values are: headers, all_headers, body" etc.

Reference: #116 (comment)
Similar functionality implemented in nuclei: projectdiscovery/nuclei#1295

Chunked responses length is not calculated correctly

Proxify version:

dev

Current Behavior:

Miscalculation in dumped response body length

Expected Behavior:

Response body length calculated correctly

Steps To Reproduce:

  1. run proxify in a terminal
  2. in other terminal, run curl --insecure -x 127.0.0.1:8888 'https://pastebin.com/raw/TYsVwM0n' to ask proxify to write the HTTP request/response file
  3. a file like ./logs/pastebin.com*.txt has now been created by proxify
  4. observe the chunked length miscalculation:
GET /raw/TYsVwM0n HTTP/1.1
Host: pastebin.com
Accept: */*
User-Agent: curl/7.68.0

HTTP/1.1 200 OK
Transfer-Encoding: chunked
Cache-Control: max-age=1800, must-revalidate
Cf-Cache-Status: MISS
Cf-Ray: 710f4cc23fa97cc5-LAX
Connection: keep-alive
Content-Type: text/plain; charset=utf-8
Date: Wed, 25 May 2022 15:28:16 GMT
Expect-Ct: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
Expires: Sat, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 25 May 2022 15:28:16 GMT
Pragma: no-cache
Server: cloudflare
Vary: Accept-Encoding
X-Content-Type-Options: nosniff
X-Frame-Options: DENY
X-Xss-Protection: 1;mode=block

38 <===== Wrong
line1
this is a line containing HTTP/1.1 FOO BAR
line3
0

Anything else:

Reference: projectdiscovery/nuclei#2068 (comment)

Log level flags are not validated

Proxify version:

0.0.7

Current Behavior:

When both -silent and -v flags are set, most logs are turned off but resp body is printed.

Expected Behavior:

When both -silent and -v flags are set, proxify returns an error or exception.

Steps To Reproduce:

  1. Run proxify -v -silent

Anything else:

Related discussion: #145

Match DSL functionality doesn't work

./proxify -request-dsl "contains(request,'firefox')" -v                                                                                                                                                           ✔

                       _ ___    
   ___  _______ __ __ (_) _/_ __
  / _ \/ __/ _ \\ \ // / _/ // /
 / .__/_/  \___/_\_\/_/_/ \_, / 
/_/                      /___/	v0.0.6

		projectdiscovery.io

Use with caution. You are responsible for your actions
Developers assume no liability and are not responsible for any misuse or damage.
HTTP Proxy Listening on 127.0.0.1:8888
Socks5 Proxy Listening on 127.0.0.1:10080
Saving traffic to logs
2022/05/04 19:32:26 [001] INFO: Got request / localhost:8081 GET http://localhost:8081/
GET http://localhost:8081/ HTTP/1.1
Connection: close
Accept: */*
Accept-Encoding: gzip
Accept-Language: en
Connection: close
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2062.124 Safari/537.36

2022/05/04 19:32:26 [001] INFO: Sending request GET http://localhost:8081/
2022/05/04 19:32:26 [001] INFO: Received response 200 OK
HTTP/1.0 200 OK
Connection: close
Content-Length: 1683
Content-Type: text/html; charset=utf-8
Date: Wed, 04 May 2022 16:32:26 GMT
Server: SimpleHTTP/0.6 Python/3.9.12

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<title>Directory listing for /</title>
</head>
<body>
<h1>Directory listing for /</h1>
<hr>
<ul>

TCP Proxy support

Hi,
can Proxify works also as TCP Proxy? That means to listen on (IP_A/localhost/0.0.0.0):port_A, do magic, and forward traffic to IP_B:port_B?

[Feature] Allow saving only requests or response when doing proxy

Actually , There Is One Issue While Saving The Requests And The Responses

Screenshot_2020-12-27_02-04-33

From The Previous Image There Is not an New Line Between Body Of The POST Request And First Line Of The Response e.g. log File Should Be Like This

Screenshot_2020-12-27_02-15-37

And If You Can Possible Add Feature To Save Only Request Without Response That Will Be a Great Because If Any One Can Use This Files With sqlmap Tool With Option -r OR fuff Tool With Option -request

Gui

fyne used?

Support for socks5 to socks5 proxy

I've been playing with this tool for a while, and just ran into an use case that I needed. In the current form only the following are allowed:

  • http to http
  • http to socks5

It would be very useful to also allow: socks5 to socks5

I already try running with: -addr socks5://192.168.255.10 and it complains about the formatting of my address and fails to start.

More explanation required for `Replay all traffic into burp` feature

Information about replay binay is missing in installation guide.

From Source

▶ GO111MODULE=on go get -v github.com/projectdiscovery/proxify/cmd/proxify
▶ GO111MODULE=on go get -v github.com/projectdiscovery/proxify/cmd/replay

From Github

▶ git clone https://github.com/projectdiscovery/proxify.git;
cd proxify/cmd/proxify; go build; cp proxify /usr/local/bin; proxify -version ;
cd ../replay; go build; cp replay /usr/local/bin; replay -version

sudo  /usr/local/bin/replay -burp-addr http://127.0.0.1:8080 -output logs/

Add support for filtering, modifying and replaying saved requests

Since we already support saving requests into files, it would be nice if we would also enable post-processing/filtering of those requests.

Use-case:

  1. automatically/manually crawl an application and proxy the requests through proxify
  2. look at the saved requests saved, notice some interesting things/patterns
  3. filter the existing local requests using your observations (e.g. consider requests only targeting a specific URL path like /api/v1/)
  4. realize it would make sense to change the session id (e.g. admin vs user session to look for authorization issues)
  5. replay the filtered and modified local requests against the target, or potentially even against another similar targets
  6. pipe it through httpx and filter only requests that returned 200 OK

Note: merging current reply in proxify will be handled in a follow-up ticket

Future Request - Support Multiple Upstream Proxies

Problem:
Currently Proxify cant handle multiple upstream proxies at once. For example, running
proxify -http-proxy http://127.0.0.1:8080 -http-proxy http://127.0.0.1:8081 -addr 127.0.0.1:8888 curl https://google.com -x 127.0.0.1:8888

This will forward the request to last http-proxy provided via the command line. So in the above example, the curl would only use http://127.0.0.1:8081 as the upstream proxy.

Suggested result:
Ideally when specifying multiple upstream proxies, Proxify should forward the request to both proxies and subsequently forward both responses back to the client.

Once this is implemented, another feature or cli argument can be created to specify how many requests to forward to one proxy, before switching to the other. The use case for this could be a proxy rotator that round-robins the requests based on a user provider integer. For example, adding a --count/-c argument.

In this hypothetical example, proxfiy would forward one http request to one proxy before switching to the next proxy (optionally it could read from a file of http-proxies).

proxify -http-proxy http://127.0.0.1:8080 -http-proxy http://127.0.0.1:8081 -addr 127.0.0.1:8888 -c 1
curl https://google.com -x 127.0.0.1:8888 >> forwards request to http://127.0.0.1:8081
curl https://google.com -x 127.0.0.1:8888 >> forwards request to http://127.0.0.1:8080
curl https://google.com -x 127.0.0.1:8888 >> forwards request to http://127.0.0.1:8081

and so on.

Supporting multiple upstream proxy

For Example , I Need To Forward Requests To Burp And Zap At The Same Time

0001

So It Is Possible To Make It To Use List Of Upstream Proxy e.g. 127.0.0.1:8080 AND 127.0.0.1:8090 As You Can See In The Previous Figure

Match-Replace rule crash

proxify -response-match-replace-dsl "regex(response,'aaaa','bbb')"
panic: interface conversion: interface {} is bool, not string

Note: DSL will be deprecated

Make the verbosity option more granular

Using the -v flag with proxify, shows the whole request.

It would be nice if -v would only show the target and the request type (e.g. HTTP POST https://projectdiscovery.io), and the body would only be shown if the -vv flag is specified.

Note: -vv should implicitly include -v.

Simple UI to display request/response view and history

We can start with a simple UI allowing visualize the request/response history easily with a simple text-based search on it.

  • Single Request / Response view
  • History of Request / Respose view
  • Search bar allowing text based search on request / response.

Socket Level Proxy Relay

  • Intercept, dump and manipulate non-http traffic (natively or interfacing with third party tools like burp/zap/mitmproxy)
  • Invisible proxy support
  • TLS MITM support with client/server certificates
  • Match/Replace DSL support
  • Plugin Support to decode specific protocols (e.g XMPP/SMTP/FTP/SSH/) => Callback functions
  • Native embedded DNS server (e.g allows non-http connections hijack without rooting/jailbreaking the device)

Match and replace doesn't work at URL path

Proxify command:

proxify -request-match-replace-dsl "replace(request,'r=','r=#')" -v

GET request:

http://testphp.vulnweb.com:80/redir.php?r=http%3A%2F%2F127.0.0.1%3A8080%23%40testphp.vulnweb.com

output:

GET /redir.php?r=http%3A%2F%2F127.0.0.1%3A8080%23%40testphp.vulnweb.com HTTP/1.1
Host: testphp.vulnweb.com:80
Accept-Encoding: gzip
User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0

HTTP/1.1 302 Moved Temporarily
Transfer-Encoding: chunked
Connection: keep-alive
Content-Type: text/html; charset=UTF-8
Date: Mon, 07 Jun 2021 17:03:23 GMT
Location: http://127.0.0.1:8080#@testphp.vulnweb.com
Server: nginx/1.19.0
X-Powered-By: PHP/5.6.40-38+ubuntu20.04.1+deb.sury.org+1

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.