☆17Aug 14, 2018Updated 7 years ago
Alternatives and similar repositories for Deep-Learning
Users that are interested in Deep-Learning are comparing it to the libraries listed below
Sorting:
- CTF platform we wrote and used for justCTF 2019☆12Jun 25, 2022Updated 3 years ago
- This is a basic bind shell script , containting both server and client classes, i will upgrade it with time adding new features and make …☆13Jun 11, 2025Updated 8 months ago
- Try to detect HTTP desync attack (https://portswigger.net/blog/http-desync-attacks-request-smuggling-reborn)☆11Sep 20, 2019Updated 6 years ago
- Visualizing Path Finding using A* algorithm☆14Nov 7, 2022Updated 3 years ago
- Collection of snippets for devtools.☆13Mar 17, 2021Updated 4 years ago
- ElasticSearch vulnerable scanner☆16Oct 6, 2019Updated 6 years ago
- Collection of the cheat sheets useful for pentesting☆10May 11, 2018Updated 7 years ago
- Rust Hacks Community Repo☆14Feb 8, 2019Updated 7 years ago
- Capture-The-Flag(CTF) toolkit☆11Jan 8, 2015Updated 11 years ago
- ☆13Oct 3, 2023Updated 2 years ago
- This automation protect against subdomain takeover on AWS env which also send alerts on slack.☆12Aug 1, 2021Updated 4 years ago
- Space war is a 2d game developed using Lua and Love 2d.☆18Oct 23, 2023Updated 2 years ago
- ☆15Apr 13, 2021Updated 4 years ago
- Java Binary data Deserializer/Serializer - Convert serialized Java Objects into readable XML☆13Feb 25, 2019Updated 7 years ago
- ☆15Feb 5, 2022Updated 4 years ago
- Everything about xss protection technology☆14Oct 22, 2019Updated 6 years ago
- ☆14Nov 29, 2019Updated 6 years ago
- POC which exploits a vulnerability within Nagios XI (5.6.5) to spawn a root shell☆13Jul 17, 2021Updated 4 years ago
- A minimal ARM ELF binary to listen on TCP port 4444 and dump the contents to standard output☆16May 7, 2020Updated 5 years ago
- Simple web crawler to crawl website and organise URLs based on page extensions.☆15Feb 20, 2020Updated 6 years ago
- A multi-threaded scanner that helps identify CORS flaws/misconfigurations☆19Nov 18, 2019Updated 6 years ago
- Basic Block-chain + mining concept using python☆14Apr 27, 2020Updated 5 years ago
- All kind of frida stuff when needed in pentesting or reverse engineering of an android app - The perfect starter kit☆18Jun 2, 2020Updated 5 years ago
- ☆18Jul 15, 2020Updated 5 years ago
- 优质安全 list☆12Nov 22, 2017Updated 8 years ago
- Takes a list of domains as the input, checks if they have a security.txt, outputs the results.☆16May 15, 2020Updated 5 years ago
- Collect OSINT from git repositories☆18Apr 6, 2021Updated 4 years ago
- ☆18Sep 6, 2018Updated 7 years ago
- A public api by which you can find some details of any mobile number in india.☆25Jun 6, 2018Updated 7 years ago
- ☆16Mar 4, 2019Updated 6 years ago
- HydraSide is a opensource Tor Based RAT (*Remote Administration Tool*)☆22Mar 12, 2015Updated 10 years ago
- LDAP Injection Vulnerability Application(Blog Sample Code)☆22Oct 4, 2018Updated 7 years ago
- Leap Motion System-based VR Interface for Unity(Shortcut menu, Tip pointer, Gesture factory)☆20Apr 12, 2017Updated 8 years ago
- OpenBugBounty - https://www.openbugbounty.org/ programs list☆23Mar 15, 2021Updated 4 years ago
- Traffic Sign Recognition with Keras.☆19Jun 23, 2017Updated 8 years ago
- [Firefox] SOP bypass PoC for CVE-2015-7214 (MFSA 2015-149)☆14Apr 28, 2016Updated 9 years ago
- ☆25May 30, 2017Updated 8 years ago
- A tools for JavaScript Recon☆24Jul 25, 2020Updated 5 years ago
- Timeinator is an extension for Burp Suite that can be used to perform timing attacks over an unreliable network such as the internet.☆22May 9, 2023Updated 2 years ago