Example for the NFT 3D Collectibles using Blender Scripting (Python).

Overview

NFT Collectibles using Blender Python

What is this?

This project is to demonstrate for generating NFT Collectible Avatar-Styled images. For details, please check https://blog.hdks.org/Create-NFT-3D-Collectibles-Using-Blender-Scripting/ .

How to Use

1. Clone this repository

git clone https://github.com/hideckies/nft-collectibles-blender-python.git

2. Settings in script files

cd nft-collectibles-blender-python
cd scripts

Set the value of each setting in script files.
In particular, PROJECT_DIR should be set to the absolute path to this repository you cloned.

In gen_metadata.py,

# gen_metadata.py

#  --- Settings --------------------------------------------

# ...

# An absolute path for the root directory
PROJECT_DIR = "c:/nft-collectibles-blender-python/"

# ...

# ---------------------------------------------------------

In gen_model.py,

# gen_model.py

#  --- Settings --------------------------------------------

# ...

# An absolute path for the root directory
PROJECT_DIR = "c:/nft-collectibles-blender-python/"

# ...

# ---------------------------------------------------------
  • Set the same path to PROJECT_DIR for both files. Currently, I don't know how to import variables from other files in Blender Python.

3. Run gen_metadata.py

Open Blender and move to Scripting workspace.

screenshot_1

To check the status during processing, you can open the console by clicking “Window”-> “Toggle System Console” in the top menu.

In Scripting workspace, click the Open -> choose a gen_metadata.py -> click the Run Script.

*If you get the error message "ERROR: Properties duplicate.", please run again.
This message show when there is a metadata for each file that has exactly the same attributes. To create a unique collection, you have to avoid duplication.

When completed, you should see json files like 0.json, 1.json, ... in outputs directory.

4. Run gen_model.py

Click the Open -> choose a gen_model.py -> click the Run Script.

When completed, you should see image files like 0.png, 1.png, ... in outputs directory.

Data Recovery from your broken Android phone

Broken Phone Recovery a guide how to backup data from your locked android phone if you broke your screen (and more) you can skip some steps depending

v1nc 25 Sep 23, 2022
Receive notifications/alerts on the most recent disclosed CVE's.

Receive notifications on the most recent disclosed CVE's.

Ameliorate 7 Nov 24, 2022
SonicWALL SSL-VPN Web Server Vulnerable Exploit

SonicWALL SSL-VPN Web Server Vulnerable Exploit

44 Nov 15, 2022
Deltaspy - an advanced keylogger that can send keylogs and screenshots to gmail

Deltaspy Deltaspy is a advanced keylogger which sends keylogs and screenshot to

Praanesh S 1 Dec 31, 2021
Python3 script for scanning CVE-2021-44228 (Log4shell) vulnerable machines.

Log4j_checker.py (CVE-2021-44228) Description This Python3 script tries to look for servers vulnerable to CVE-2021-44228, also known as Log4Shell, a v

lfama 8 Feb 27, 2022
An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.

RonnieColemanYARAParser This script is named after Ronnie Coleman, and peforms bulk lifts on arbitary file features using YARA console logging. Requir

Steve 20 Dec 13, 2022
log4j2 passive burp rce scanning tool get post cookie full parameter recognition

log4j2_burp_scan 自用脚本log4j2 被动 burp rce扫描工具 get post cookie 全参数识别,在ceye.io api速率限制下,最大线程扫描每一个参数,记录过滤已检测地址,重复地址 token替换为你自己的http://ceye.io/ token 和域名地址

5 Dec 10, 2021
Attack SQL Server through gopher protocol

Attack SQL Server through gopher protocol

hack2fun 17 Nov 30, 2022
A burp-suite plugin that extract all parameter names from in-scope requests

ParamsExtractor A burp-suite plugin that extract all parameters name from in-scope requests. You can run the plugin while you are working on the targe

29 Nov 09, 2022
An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.

Log4JHunt An automated, reliable scanner for the Log4Shell CVE-2021-44228 vulnerability. Video demo: Usage Here the help usage: $ python3 log4jhunt.py

RedHunt Labs 39 Nov 21, 2022
An advanced multi-threaded, multi-client python reverse shell for hacking linux systems

PwnLnX An advanced multi-threaded, multi-client python reverse shell for hacking linux systems. There's still more work to do so feel free to help out

0xTRAW 212 Dec 24, 2022
Implementation of an attack on a tropical algebra discrete logarithm based protocol

Implementation of an attack on a tropical algebra discrete logarithm based protocol This code implements the attack detailed in the paper: On the trop

3 Dec 30, 2021
Tools to make working the Arch Linux Security Tracker easier

This is a collection of Python scripts to make working with the Arch Linux Security Tracker easier.

Jonas Witschel 6 Jul 13, 2022
Malware Configuration And Payload Extraction

CAPE: Malware Configuration And Payload Extraction CAPE is a malware sandbox. It is derived from Cuckoo and is designed to automate the process of mal

Kevin O'Reilly 1k Dec 30, 2022
Caretaker 2 Jun 06, 2022
Tool for finding PHP source code vulnerabilities.

vulnz Tool for finding php source code vulnerabilities. Scans PHP source code and prints out potentially dangerous lines. This tool is useful for secu

Mateo Hanžek 1 Jan 14, 2022
This python script will automate the testing for the Log4J vulnerability for HTTP and HTTPS connections.

Log4J-Huntress-Automate-Script This python script will automate the testing for the Log4J vulnerability for HTTP and HTTPS connections. Pre-Requisits

1 Dec 16, 2021
Keystroke logging, often referred to as keylogging or keyboard capturing

Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording the keys struck on a keyboard, typically covertly, so that a person using the keyboard is unaware

Harsha G 2 Jan 11, 2022
Python low-interaction honeyclient

Thug The number of client-side attacks has grown significantly in the past few years shifting focus on poorly protected vulnerable clients. Just as th

Angelo Dell'Aera 896 Dec 19, 2022
How to exploit a double free vulnerability in 2021. 'Use-After-Free for Dummies'

This bug doesn’t exist on x86: Exploiting an ARM-only race condition How to exploit a double free and get a shell. "Use-After-Free for dummies" In thi

Stephen Tong 1.2k Dec 25, 2022