Python lib to automate basic QFT calculations like Wick-contractions.

Overview

QFTools

Python lib to automate basic QFT calculations like Wick-contractions.

Features

  • Wick contractions for real scalar fields
  • Wick contractions for complex scalar fields
  • Distingish between vacuum and non-vacuum contractions

Setup

QFTools is programmed based on phyton3. You can either download the above listed files or you simply clone this repository by

git clone https://github.com/Bra-A-Ket/QFTools.git

Furthermore, make sure that all required packages are installed on your machine.

External / Required Packages

  • Itertools is needed to compute all possible combinations of numbers (Wick contractions)
python3 -m pip install itertools

Usage / List of Commands

Basic Usage

QFTools takes simple opt-inputs. To see the version simple execute via console

python3 qftools.py -v

The help menu is available via

python3 qftools.py -h

Check current verion

python3 qftools.py -v

or

python3 qftools.py -version

Help menu

python3 qftools.py -h

or

python3 qftools.py -help

Wick contractions

python3 qftools -w <type> <mode> <output> <fields>

or

python3 qftools --wick <type> <mode> <output> <fields>

where the parameters are:
type : rsf (for real scalar field), csf (for complex scalar field)
mode : all (list all possible contractions), vac (only vacuum-like contractions), nvac (only non-vacuum-like contractions)
output : print (print contractions on console), save (save contractions in csv-file) fields : numbered fields, such that the number symolizes the argument of the field, e.g. 1 2 3 3 (note the spacing)

Examples

If you want to calculate <0|Tphi(x_1)phi(x_2)phi(x_3)phi(x_3)|0> for a real scalar field phi including all contractions, simply use

python3 qftools.py --wick rsf all print 1 2 3 3

The result is printed on the console due to the parameter 'print'. Note that |0> is the free vacuum.
Output:

<0|T['1', '2', '3', '3']|0> =

2 x [['1', '3'], ['2', '3']] +
1 x [['1', '2'], ['3', '3']]
process finished in 0.07 ms

This should be read as: <0|T['1', '2', '3', '3']|0> = 2 x <0|Tphi(x_1)phi(x_3)><0|Tphi(x_2)phi(x_3)|0> + 1 x <0|Tphi(x_1)phi(x_2)|0><0|Tphi(x_3)phi(x_3)|0>

Update Notes

Version 1.1.1

Wick contraction for real scalar field now counts repeated contractions and prints the according multiple.

Version 1.1

Updated README.md. Included output parameter for Wick contractions.

Version 1.0

Initial upload of the programm. Only the basic file-structure and logic for real scalar field Wick contractions is implemented.

Metal Gear Online 2 (MGO2) stage files decryption

Metal Gear Online 2 decryption tool Metal Gear Online 2 (MGO2) has an additional layer of encryption for stage files. I was not able to find info abou

4 Sep 02, 2022
Code to do NF in HDR,HEVC,HPL,MPL

Netflix-DL 6.0 |HDR-HEVC-MPL-HPL NOT Working| ! Buy working netflix cdm from [em

4 Dec 28, 2021
Time Discretization-Invariant Safe Action Repetition for Policy Gradient Methods

Time Discretization-Invariant Safe Action Repetition for Policy Gradient Methods This repository is the official implementation of Seohong Park, Jaeky

Seohong Park 6 Aug 02, 2022
Red Team Toolkit is an Open-Source Django Offensive Web-App which is keeping the useful offensive tools used in the red-teaming together.

RedTeam Toolkit Note: Only legal activities should be conducted with this project. Red Team Toolkit is an Open-Source Django Offensive Web-App contain

Mohammadreza Sarayloo 382 Jan 01, 2023
AmiEviL - This program uses the Virus Total API to determine if your suspicious file is malicious or not

AmiEviL - This program uses the Virus Total API to determine if your suspicious file is malicious or not. The program requests the hash of the file and outputs information (if any). This version will

Kirk 1 Jan 03, 2022
Grafana-0Day-Vuln-POC

Grafana V8.0+版本存在未授权任意文件读取 0Day漏洞 - POC 1 漏洞信息 1.1 基本信息 漏洞厂商:Grafana 厂商官网:https://grafana.com/ 1.2 漏洞描述 Grafana是一个跨平台、开源的数据可视化网络应用程序平台。用户配置连接的数据源之后,Gr

mik1th0n 3 Dec 13, 2021
Lnkbomb - Malicious shortcut generator for collecting NTLM hashes from insecure file shares

Lnkbomb Lnkbomb is used for uploading malicious shortcut files to insecure file

Joe Helle 216 Jan 08, 2023
Meterpreter Reverse shell over TOR network using hidden services

Poiana Reverse shell over TOR network using hidden services Features - Create a hidden service - Generate non-staged payload (python/meterpreter_rev

calfcrusher 80 Dec 21, 2022
Malware arcane - Scripts and notes on my malware analysis journey

Malware Arcane Repository of notes and scripts I use when doing malware analysis

Python directory buster, multiple threads, gobuster-like CLI, web server brute-forcer, URL replace pattern feature.

pybuster v1.1 pybuster is a tool that is used to brute-force URLs of web servers. Features Directory busting (URI) URL replace patterns (put PYBUSTER

Glaukio 1 Jan 05, 2022
CVE-2021-44228 log4j 2.x rce漏洞检测工具

#1 使用说明 CVE-2021-44228 log4j 2.x rce漏洞检测工具,对目标链接发起get请求并利用dnslog探测是否有回显 $ python3 log4j-scan.py -h

CoCo ainrm- 4 Jan 13, 2022
VMware vCenter earlier v(7.0.2.00100) unauthorized arbitrary file read

vcenter_fileread_exploit VMware vCenter earlier v(7.0.2.00100) unauthorized arbitrary file read Usage python3 vCenter_fileread.py http(s)://ip Referen

Ashish Kunwar 4 Sep 23, 2022
FBGen is simple facebook user based wordlist generator using Username/ID and cookie.

FBGen is simple facebook user based wordlist generator using Username/ID and cookie.

2 Jul 20, 2022
Ini membuat tema berbasis bendera Indonesia with Python + Linux.py

tema Ubah Tema Termux Menjadi Linux Ubah Font Termux Jadi Linux dibuat oleh wahyudioputra INSTALL pkg update && pkg upgrade pkg install python pkg ins

wahyudioputra 2 Nov 30, 2021
A brute force tool for password-protected zip file

Bzip A brute force tool for password-protected zip file/folder(s). Note that this tool can only crack .zip files. Please DO not misuse. Installation g

3 Nov 13, 2021
MD5-CRACKER - A gmail brute force app created with python3

MD5-CRACKER So this is my first app i created with python3 . if you guys downloa

2 Nov 10, 2022
Trustme: #1 quality TLS certs while you wait

trustme: #1 quality TLS certs while you wait You wrote a cool network client or server. It encrypts connections using TLS. Your test suite needs to ma

479 Dec 27, 2022
Directory Traversal in Afterlogic webmail aurora and pro

CVE-2021-26294 Exploit Directory Traversal in Afterlogic webmail aurora and pro . Description: AfterLogic Aurora and WebMail Pro products with 7.7.9 a

Ashish Kunwar 8 Nov 09, 2022
Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.

RITA (Real Intelligence Threat Analytics) in Jupyter Notebook RITA is an open source framework for network traffic analysis sponsored by Active Counte

Mehmet E. 157 Nov 24, 2022
Sqli-Scanner is a python3 script written to scan websites for SQL injection vulnerabilities

Sqli-Scanner is a python3 script written to scan websites for SQL injection vulnerabilities Features 1 Scan one website 2 Scan multiple websites Insta

Anontemitayo 9 Dec 30, 2022