Latest version: v0.1.3
The information on this page was curated by experts in our Cybersecurity Intelligence Team.
This is an implementation of Hearst patterns, for finding hyponyms, written in Python.
No known vulnerabilities found
Has known vulnerabilities