Automatic SQL injection and database takeover tool
python
database
detection
sql-injection
pentesting
exploitation
sqlmap
takeover
vulnerability-scanner
-
Updated
Jun 29, 2022 - Python
Enhancement
A discussion in #614 revealed a good place for improvement - we should ensure that input image is continuous upon start of the augmentation pipeline. This could be implemented by adding
image = np.ascontiguousarray(image)
to image and mask targets.A proposed place to add this call - somewhere at the beginning of
A.Compose.__call__
.