Git Product home page Git Product logo

hotwax's Introduction

image

HOTWAX

Hotwax is a script to provision a set of extra pentesting tools onto a Kali Linux machine in a consistent manner.

Getting Started

These instructions will get you a copy of the project up and running on your local machine for deployment AND development purposes.

Prerequisites

  • Kali Linux 2019.4 or older. (Presently, will not work on Kali LInux 2020.1 or newer, due to change from default root account configuration to non-root user account configuration. To be fixed in near future.)

  • UPDATE Modified to work on Kali Linux 2020.2a+ See below instructions. (However these changes have not been tested on 2019.4 or older versions and may not longer work)

  • Git

  • Ansible

apt update -y
apt install -y git ansible

Installing

Clone the HOTWAX repository.

cd ~
git clone https://github.com/BrashEndeavours/hotwax

Run the playbook

cd hotwax

#for Kali Linux 2019.4 or older:
ansible-playbook playbook.yml

#for Kali Linux 2020.2a and newer (executed with user part of sudo group, default for "kali" username):
ansible-playbook playbook.yml -K


Tools updated:

Tools installed:

  • Arjun - Arjun is an HTTP parameter discovery suite.
  • AutoRecon - AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.
  • BloodHound - Six Degrees of Domain Admin.
  • chisel - A fast TCP tunnel over HTTP.
  • evil-winrm - The ultimate WinRM shell for hacking/pentesting.
  • gobuster - Directory/File, DNS and VHost busting tool written in Go
  • LinEnum - Local Linux Enumeration & Privilege Escalation Script
  • nishang - Framework and collection of scripts and payloads which enables usage of PowerShell for penetration testing.
  • One-Lin3r - On demand one-liners that aid in penetration testing operations, privilege escalation and more
  • OSCP Exam Report Template - Modified template for the OSCP Exam
  • Powerless - A Windows privilege escalation (enumeration) script designed with OSCP labs (i.e. legacy Windows machines without Powershell) in mind.
  • PowerSploit - Collection of Microsoft PowerShell modules that can be used to aid penetration testers during all phases of an assessment.
  • proxychains-ng - proxychains ng (new generation) - a preloader which hooks calls to sockets in dynamically linked programs and redirects it through one or more socks/http proxies. continuation of the unmaintained proxychains project.
  • pspy - Monitor linux processes without root permissions.
  • SecLists - Collection of usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and more.
  • sherlock - Find usernames across social networks.
  • sshuttle - Transparent proxy server that works as a poor man's VPN. Forwards over ssh. Doesn't require admin. Works with Linux and MacOS. Supports DNS tunneling.
  • webshell - This is a webshell open source project.
  • Windows PHP Reverse Shell - Simple php reverse shell implemented using bina- https://github.com/ucki/zauberfeder, based on an webshell.
  • XSStrike - Advanced XSS scanner
  • zauberfeder - A LaTex reporting template.
  • crackmapexec - A swiss army knife for pentesting networks.
  • windows-kernel-exploits - Precompiled Windows Exploits.
  • exiftool - ExifTool meta information reader/writer. Great for viewing and manipulating exif-data.
  • html2text - Convert HTML to clean, easy-to-read plain ASCII text.
  • mingw-w64 - GCC for Windows 64 & 32 bits.
  • msfpc - MSFvenom Payload Creator (MSFPC)
  • wce - A security tool to list logon sessions and add, change, list and delete associated credentials.
  • Windows-Exploit-Suggester - This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target.
  • pyftpdlib - Extremely fast and scalable Python FTP server library. Spin up FTP Server with a one-liner.
  • ssh-os - Nmap Script that identifies Debian, Ubuntu, FreeBSD version based on default SSH banner response.
  • empire - Empire is a post-exploitation framework that includes a pure-PowerShell2.0 Windows agent, and a pure Python 2.6/2.7 Linux/OS X agent.
  • medusa - Medusa is a speedy, parallel, modular login brute-forcer. Similar to ncrack and Hydra.
  • PEASS - These tools search for possible local privilege escalation paths that you could exploit and print them to you with nice colors so you can recognize the misconfigurations easily.

Contributing

Please read CONTRIBUTING.md for details on the code of conduct, and the process for submitting pull requests.

Authors

Contributors

  • Want your name here? See CONTRIBUTING.md for details.

  • Alec Mather-Shapiro (whoisflynn) - Added AutoRecon, Windows PHP Reverse Shell, and OSCP Exam Template - whoisflynn

  • Richard Lam (richlamdev) - Added crackmapexec, windows-kernel-exploits, exiftool, html2text, mingw-w64, msfpc, wce, windows-exploit-suggester, pyftpdlib, ssh-os.nse, medusa - richhlamdev

Acknowledgements

License

This project is licensed under the MIT License - see the LICENSE.md file for details

hotwax's People

Contributors

richlamdev avatar roguepullrequest avatar six2dez avatar whoisflynn avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar

hotwax's Issues

E: Package 'perl-modules' has no installation candidate

Part of the installation kept failing with the following error message:

TASK [Install Samba compilation prerequisites] ***************************************** fatal: [127.0.0.1]: FAILED! => changed=false cache_update_time: 1583747690 cache_updated: false msg: |- '/usr/bin/apt-get -y -o "Dpkg::Options::=--force-confdef" -o "Dpkg::Options::=--force-confold" install 'autoconf' 'bind9utils' 'bison' 'debhelper' 'docbook-xml' 'docbook-xsl' 'flex' 'gdb' 'glusterfs-common' 'heimdal-clients' 'heimdal-dev' 'heimdal-kcm' 'heimdal-multidev' 'krb5-config' 'lcov' 'libacl1-dev' 'libaio-dev' 'libarchive-dev' 'libattr1-dev' 'libavahi-client-dev' 'libavahi-common-dev' 'libblkid-dev' 'libbsd-dev' 'libcap-dev' 'libcups2-dev' 'libdbus-1-dev' 'libfam-dev' 'libgcrypt20-dev' 'libglib2.0-dev' 'libglusterfs-dev' 'libgnutls28-dev' 'libgpgme-dev' 'libgssapi3-heimdal' 'libjansson-dev' 'libjson-perl' 'libkadm5clnt7-heimdal' 'libkadm5srv8-heimdal' 'libkafs0-heimdal' 'libkdc2-heimdal' 'libkrb5-26-heimdal' 'libldap2-dev' 'libldb-dev' 'liblmdb-dev' 'liblttng-ust-dev' 'libmd-dev' 'libmhash-dev' 'libncurses5-dev' 'libotp0-heimdal' 'libpam0g-dev' 'libparse-yapp-perl' 'libpcap-dev' 'libpopt-dev' 'libreadline-gplv2-dev' 'libsl0-heimdal' 'libssl1.0-dev' 'libsystemd-dev' 'libtalloc-dev' 'libtasn1-6-dev' 'libtasn1-bin' 'libtdb-dev' 'libtevent-dev' 'libunwind-dev' 'lmdb-utils' 'mingw-w64' 'nettle-dev' 'perl-modules' 'python-dbg' 'python-iso8601' 'python-markdown' 'python3-dbg' 'python3-gnupg' 'python3-iso8601' 'tree' 'uuid-dev' 'xfslibs-dev'' failed: E: Package 'perl-modules' has no installation candidate rc: 100 stderr: |- E: Package 'perl-modules' has no installation candidate stderr_lines: <omitted> stdout: |- Reading package lists... Building dependency tree... Reading state information... Package perl-modules is a virtual package provided by: perl-modules-5.28 5.28.1-6 perl-modules-5.30 5.30.0-9 stdout_lines: <omitted>

Hotfixed by editing tasks/install_custom_samba.yml and changing "perl-modules" to "perl-modules-5.30".

Do we still need the custom samba on Kali 2020.2?

Kali now has Samba version 4.11.5-Debian
The tasks/install_custom_samba.yml installs Samba version 4.10.8
Also, while installing tasks/install_custom_samba.yml, I get this error:

PLAY [Converge] ***********************************************************************************************************************************************************
                                                                                     
TASK [Gathering Facts] ****************************************************************************************************************************************************
[WARNING]: Platform linux on host 127.0.0.1 is using the discovered Python interpreter at /usr/bin/python, but future installation of another Python interpreter could
change this. See https://docs.ansible.com/ansible/2.9/reference_appendices/interpreter_discovery.html for more information.
ok: [127.0.0.1]                                                                      
                                                                                     
TASK [include_vars] *******************************************************************************************************************************************************
                                                                                     
TASK [include_tasks] ******************************************************************************************************************************************************
included: /opt/hotwax/tasks/install_custom_samba.yml for 127.0.0.1
                                          
TASK [Install Samba compilation prerequisites] ****************************************************************************************************************************
[WARNING]: Updating cache and auto-installing missing dependency: python-apt
fatal: [127.0.0.1]: FAILED! => changed=false 
  cmd: apt-get install --no-install-recommends python-apt -y -q
  msg: 'E: Package ''python-apt'' has no installation candidate'
  rc: 100     
  stderr: |-     
    E: Package 'python-apt' has no installation candidate
  stderr_lines: <omitted>             
  stdout: |-                           
    Reading package lists...                                                         
    Building dependency tree...
    Reading state information...
    Package python-apt is not available, but is referred to by another package.
    This may mean that the package is missing, has been obsoleted, or
    is only available from another source
    However the following packages replace it:
      python3-apt python-apt-common python3-apt-dbg python-apt-doc
  stdout_lines: <omitted>

PLAY RECAP ****************************************************************************************************************************************************************
127.0.0.1                  : ok=2    changed=0    unreachable=0    failed=1    skipped=1    rescued=0    ignored=0

Link juice from included tools

To help gain some traction, was thinking about passing a note to tool repo owners to include somewhere. How about?

THISTOOL is now included with project Hotwax, which provisions many useful pentest tools in a consistent manner onto new Kali boxes.

Python-apt missing

TASK [Install python2.7] *******************************************************
[WARNING]: Updating cache and auto-installing missing dependency: python-apt
fatal: [127.0.0.1]: FAILED! => changed=false
cmd: apt-get install --no-install-recommends python-apt -y -q
msg: 'E: Package ''python-apt'' has no installation candidate'
rc: 100
stderr: |-
E: Package 'python-apt' has no installation candidate
stderr_lines:
stdout: |-
Reading package lists...
Building dependency tree...
Reading state information...
Package python-apt is not available, but is referred to by another package.
This may mean that the package is missing, has been obsoleted, or
is only available from another source
However the following packages replace it:
python3-apt-dbg python3-apt python-apt-doc python-apt-common
stdout_lines:

It keeps having this error while trying to run ansible-playbook playbook.yml commad. Please help

Kali 2019.4 Issues

I'm trying this playbook on Kali 2019.4 64 bit VirtualBox image. I just removed the package from the list in the playbook and everything seemed to compile fine.

Here is the error. An apt search python-pip yields nothing, only python3-pip exists now.

TASK [Install Samba compilation prerequisites] *******************************************************************
fatal: [127.0.0.1]: FAILED! => changed=false 
  msg: No package matching 'python-gnupg' is available

I'm working on running the rest of the playbook and will report any errors. It fixed the enum4linux issues I was having - I've been searching for quite awhile to fix those so I can't thank you enough! This is an amazing repo.

Playbook broken due to missing python-gnupg dependency

It appears that python-gnupg has been removed from repos due to Python 2.7 reaching end of support. This means the playbook fails to install.

TASK [Install Samba compilation prerequisites] *********************************
fatal: [127.0.0.1]: FAILED! => changed=false
msg: No package matching 'python-gnupg' is available

Make autorecon use enum4linuxpy

Now that enum4linuxpy is included in favor of the original enum4linux, autorecon's configuration should be adapted to use enum4linuxpy.

I can provide a pull request if desired.

python-pip not in kali-rolling repos, which breaks ansible build

python-pip isn't found in Kali Rolling v2020.3 repos (source) which means all the playbook tasks can't run. I tried to get around it by commenting out - include_tasks: tasks/python_virtualenv.yml in playbook.yml. But that eventually led to the problem of actually needing pip2 for pwntools.

Get python-pip:

$ wget https://bootstrap.pypa.io/get-pip.py
$ sudo python get-pip.py

But the virtualenv setup is still necessary or sherlock throws an error, so I commented that out. Then install_webshell.yml throws an error, but luckily after commenting that out in playbook.yml ansible could finish the playbook.

Original error:

root@kali:~/hotwax# ansible-playbook playbook.yml -K
BECOME password: 

PLAY [Converge] ****************************************************************
[...]
TASK [include_tasks] ***********************************************************
included: /root/hotwax/tasks/python_virtualenv.yml for 127.0.0.1

TASK [Install python2.7] *******************************************************
ok: [127.0.0.1]

TASK [Install pip and pip3] ****************************************************
fatal: [127.0.0.1]: FAILED! => changed=false 
  msg: No package matching 'python-pip' is available

PLAY RECAP *********************************************************************
127.0.0.1                  : ok=5    changed=0    unreachable=0    failed=1    skipped=2    rescued=0    ignored=0  

Error after commenting out:

TASK [include_tasks] ***********************************************************
included: /root/hotwax/tasks/install_pwntools.yml for 127.0.0.1

TASK [Install pwntools under Python 2 (pip2)] **********************************
fatal: [127.0.0.1]: FAILED! => changed=false 
  msg: Unable to find any of pip2 to use.  pip needs to be installed.

PLAY RECAP *********************************************************************
127.0.0.1                  : ok=94   changed=44   unreachable=0    failed=1    skipped=2    rescued=0    ignored=0                                    

Later error after get-pip.py:

[...]
TASK [include_tasks] ***********************************************************
included: /root/hotwax/tasks/install_sherlock.yml for 127.0.0.1

TASK [Ensure git is installed.] ************************************************
ok: [127.0.0.1]

TASK [Copy sherlock from repository] *******************************************
changed: [127.0.0.1]

TASK [Install sherlock] ********************************************************
fatal: [127.0.0.1]: FAILED! => changed=false 
  msg: 'Failed to find required executable virtualenv in paths: /usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin'                         

PLAY RECAP *********************************************************************
127.0.0.1                  : ok=103  changed=18   unreachable=0    failed=1    skipped=17   rescued=0    ignored=0                                    

Error after commenting out Sherlock's YML:

TASK [include_tasks] ***********************************************************
included: /root/hotwax/tasks/install_webshell.yml for 127.0.0.1

TASK [Ensure git is installed.] ************************************************
ok: [127.0.0.1]

TASK [Copy the webshell project from repository] *******************************
fatal: [127.0.0.1]: FAILED! => changed=false 
  msg: |-
    Failed to init/update submodules: Submodule path 'AntSwordProject/AwesomeScript': checked out 'dbcc508338412ad6676713c13bf0c47247f89e5c'          
    Submodule path 'BlackArch/webshells': checked out '0701fcb26c92403fa8a45a1794a2c9fb3811850a'                                                      
    Submodule path 'DeEpinGh0st/PHP-bypass-collection': checked out '8d1e82f0084b9cfbb31ba16bd3d4de64642d1700'                                        
    Submodule path 'JohnTroony/php-webshells': checked out '226a15d0684e2f893caed0b94fbbf0037b89adea'                                                 
    Submodule path 'JoyChou93/webshell': checked out '2185acc2b494f7c0dd8487273d514fb89ebe9240'                                                       
    Submodule path 'LandGrey/webshell-detect-bypass': checked out '54c33e525f9d7c7d1fc942ad3b9471c898be95b1'                                          
    Submodule path 'WangYihang/Webshell-Sniper': checked out 'dc657fb1c5a01414205b62d3c90c77bba0202c2d'                                               
    Submodule path 'backlion/webshell': checked out '4ced903c80d5dd5014e950791315b6e10fdc7ed8'                                                        
    Submodule path 'bartblaze/PHP-backdoors': checked out 'b15017f9c563c89e97f2b491a487a4f7be1a10a4'                                                  
    Submodule path 'bartblaze/PHP-backdoors/Deobfuscated/b374kShell': checked out '63b33c4c750f16cb52db5f26098dfba10667600d'                          
    Submodule path 'lcatro/PHP-WebShell-Bypass-WAF': checked out '672f2ceb7d73a445a7bdd3883863495f87c07902'                                           
    Submodule path 'lhlsec/webshell': checked out '4669c5f8e36ef9cf48710fe5c9c622ec825bb017'                                                          
    Submodule path 'malwares/WebShell': checked out '2c064553f7fd29fc2e5359270bd201ffa5d51f39'                                                        
    Submodule path 'oneoneplus/webshell': checked out '6f030b91c18d9743507cac5cabe7fede665bfd9e'                                                      
    Submodule path 'tanjiti/webshellSample': checked out 'ccf0cce24c4288d6224d1605a7503da73bcfe297'                                                   
    Submodule path 'tdifg/WebShell': checked out 'bb669471d21bbf874f0a4bcfc872f823323ec694'                                                           
    Submodule path 'threedr3am/JSP-Webshells': checked out '77b0da57a9677f0280205f8a9c676b09847c7245'                                                 
    Submodule path 'vnhacker1337/Webshell': checked out 'ac08d6ddbcdca258da6fb3ee15aca3a19136786d'                                                    
    Submodule path 'webshellpub/awsome-webshell': checked out '3e29e894a728077c44136cffbeca4c158acbc23d'                                              
    Submodule path 'xl7dev/WebShell': checked out 'f7cd87feb5ef0375fc7a7cbcfea15713a3fb5c5b'                                                          
    Submodule path 'ysrc/webshell-sample': checked out 'dbaeee16226aba66138b9d7ff68b6a2b2644e9e6'                                                     
    Submodule 'AntSwordProject/AwesomeScript' (https://github.com/AntSwordProject/AwesomeScript) registered for path 'AntSwordProject/AwesomeScript'  
    Submodule 'BlackArch/webshells' (https://github.com/BlackArch/webshells) registered for path 'BlackArch/webshells'                                
    Submodule 'DeEpinGh0st/PHP-bypass-collection' (https://github.com/DeEpinGh0st/PHP-bypass-collection) registered for path 'DeEpinGh0st/PHP-bypass-collection'                                                                 
    Submodule 'JohnTroony/php-webshells' (https://github.com/JohnTroony/php-webshells) registered for path 'JohnTroony/php-webshells'                 
    Submodule 'JoyChou93/webshell' (https://github.com/JoyChou93/webshell) registered for path 'JoyChou93/webshell'                                   
    Submodule 'LandGrey/webshell-detect-bypass' (https://github.com/LandGrey/webshell-detect-bypass) registered for path 'LandGrey/webshell-detect-bypass'                                                                       
    Submodule 'WangYihang/Webshell-Sniper' (https://github.com/WangYihang/Webshell-Sniper) registered for path 'WangYihang/Webshell-Sniper'           
    Submodule 'backlion/webshell' (https://github.com/backlion/webshell) registered for path 'backlion/webshell'                                      
    Submodule 'bartblaze/PHP-backdoors' (https://github.com/bartblaze/PHP-backdoors) registered for path 'bartblaze/PHP-backdoors'                    
    Submodule 'lcatro/PHP-WebShell-Bypass-WAF' (https://github.com/lcatro/PHP-WebShell-Bypass-WAF) registered for path 'lcatro/PHP-WebShell-Bypass-WAF'                                                                          
    Submodule 'lhlsec/webshell' (https://github.com/lhlsec/webshell) registered for path 'lhlsec/webshell'                                            
    Submodule 'malwares/WebShell' (https://github.com/malwares/WebShell) registered for path 'malwares/WebShell'                                      
    Submodule 'oneoneplus/webshell' (https://github.com/oneoneplus/webshell) registered for path 'oneoneplus/webshell'                                
    Submodule 'tanjiti/webshellSample' (https://github.com/tanjiti/webshellSample) registered for path 'tanjiti/webshellSample'                       
    Submodule 'tdifg/WebShell' (https://github.com/tdifg/WebShell) registered for path 'tdifg/WebShell'                                               
    Submodule 'threedr3am/JSP-Webshells' (https://github.com/threedr3am/JSP-Webshells) registered for path 'threedr3am/JSP-Webshells'                 
    Submodule 'vnhacker1337/Webshell' (https://github.com/vnhacker1337/Webshell) registered for path 'vnhacker1337/Webshell'                          
    Submodule 'webshellpub/awsome-webshell' (https://github.com/webshellpub/awsome-webshell) registered for path 'webshellpub/awsome-webshell'        
    Submodule 'xl7dev/WebShell' (https://github.com/xl7dev/WebShell) registered for path 'xl7dev/WebShell'                                            
    Submodule 'ysrc/webshell-sample' (https://github.com/ysrc/webshell-sample) registered for path 'ysrc/webshell-sample'                             
    Cloning into '/opt/webshell/AntSwordProject/AwesomeScript'...
    Cloning into '/opt/webshell/BlackArch/webshells'...
    Cloning into '/opt/webshell/DeEpinGh0st/PHP-bypass-collection'...
    Cloning into '/opt/webshell/JohnTroony/php-webshells'...
    Cloning into '/opt/webshell/JoyChou93/webshell'...
    Cloning into '/opt/webshell/LandGrey/webshell-detect-bypass'...
    Cloning into '/opt/webshell/WangYihang/Webshell-Sniper'...
    Cloning into '/opt/webshell/backlion/webshell'...
    Cloning into '/opt/webshell/bartblaze/PHP-backdoors'...
    Cloning into '/opt/webshell/lcatro/PHP-WebShell-Bypass-WAF'...
    Cloning into '/opt/webshell/lhlsec/webshell'...
    Cloning into '/opt/webshell/malwares/WebShell'...
    Cloning into '/opt/webshell/oneoneplus/webshell'...
    Cloning into '/opt/webshell/tanjiti/webshellSample'...
    Cloning into '/opt/webshell/tdifg/WebShell'...
    Cloning into '/opt/webshell/threedr3am/JSP-Webshells'...
    Cloning into '/opt/webshell/vnhacker1337/Webshell'...
    Cloning into '/opt/webshell/webshellpub/awsome-webshell'...
    Cloning into '/opt/webshell/xl7dev/WebShell'...
    Cloning into '/opt/webshell/ysrc/webshell-sample'...
    Submodule 'Deobfuscated/b374kShell' (https://github.com/b374k/b374k) registered for path 'bartblaze/PHP-backdoors/Deobfuscated/b374kShell'        
    Cloning into '/opt/webshell/bartblaze/PHP-backdoors/Deobfuscated/b374kShell'...                                                                   
    fatal: No url found for submodule path 'xl7dev/WebShell/Other/Webshell' in .gitmodules                                                            
    Failed to recurse into submodule path 'xl7dev/WebShell'

PLAY RECAP *********************************************************************
127.0.0.1                  : ok=104  changed=10   unreachable=0    failed=1    skipped=20   rescued=0    ignored=0

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.