Latest version: v0.2.0
The information on this page was curated by experts in our Cybersecurity Intelligence Team.
A wrapper around tesseract that can be easily called from the command line on an image from the clipboard
No known vulnerabilities found