AashitaK / ML-WorkshopsView external linksLinks
Workshop series at Harvey Mudd College.
☆11Apr 21, 2021Updated 4 years ago
Alternatives and similar repositories for ML-Workshops
Users that are interested in ML-Workshops are comparing it to the libraries listed below
Sorting:
- Jenkins Security Research or Hacking Jenkins ;)☆12Dec 10, 2024Updated last year
- Certipy in Docker☆13Mar 28, 2024Updated last year
- Powershell - Simple HTTP Server☆13Feb 17, 2022Updated 3 years ago
- Short writeups/solvers for interesting CTF challenges.☆16Nov 12, 2022Updated 3 years ago
- ☆24Sep 20, 2020Updated 5 years ago
- A wordlist for Infosec people in Pakistan☆18Aug 6, 2020Updated 5 years ago
- A python3 and bash PoC for CVE-2021-4034 by Kim Schulz☆21Jan 27, 2022Updated 4 years ago
- Standardised setup for researching WordPress plugin- and theme vulnerabilities.☆29Nov 16, 2023Updated 2 years ago
- AMSI Bypass for powershell☆30Apr 26, 2022Updated 3 years ago
- Faceless - Deepfake detection☆24May 11, 2023Updated 2 years ago
- My attempt to teach others about microprocessors and programming in IA-32 and IA-64 assembly, and to spread the word of how awesome it is…☆29Aug 8, 2022Updated 3 years ago
- An intentionally vulnerable Android Application to demonstrate various vulnerabilities that airses in Android Components.☆42Apr 11, 2025Updated 10 months ago
- Get started with writing your first ever Windows Driver☆35Nov 4, 2023Updated 2 years ago
- This repository contains a collection of code examples and tutorials for programming in x86 assembly language☆31Jun 4, 2025Updated 8 months ago
- Tag and recommend Python exercises based on algorithmic features☆34Jan 15, 2026Updated 3 weeks ago
- ☆39Dec 27, 2020Updated 5 years ago
- ☆43Feb 17, 2021Updated 4 years ago
- Presentaciones de congresos☆55Jun 21, 2024Updated last year
- my nuclei templates☆41Apr 21, 2024Updated last year
- ☆60Apr 25, 2025Updated 9 months ago
- Hands on lab materials for the PowerShell Security session☆47Aug 29, 2019Updated 6 years ago
- ☆53Aug 11, 2024Updated last year
- Curated list of Meta (formerly Facebook) owned IT assets☆56Jul 20, 2025Updated 6 months ago
- CVE-2021-27928 MariaDB/MySQL-'wsrep provider' 命令注入漏洞☆63Jun 29, 2023Updated 2 years ago
- Exiftool bug which leads to RCE☆76May 17, 2021Updated 4 years ago
- Evade the boys in blue and acquire a reverse shell using powercat v2.0☆60Jan 18, 2023Updated 3 years ago
- Modern & flexible browser fingerprinting library☆61Oct 8, 2017Updated 8 years ago
- This repo contains some problem solutions from different popular coding platforms like Code Chef, Leet Code, Hacker Blocks,etc.☆65Jun 20, 2023Updated 2 years ago
- Cloning apk for bypassing code tampering detection, Google Safety Net and scanning vulnerable plugins☆88Jun 16, 2023Updated 2 years ago
- With this script you can bypass both root detection and ssl pinning for your android app.☆95May 24, 2023Updated 2 years ago
- AIC Quarter 2 Learning and practice resources☆89May 9, 2021Updated 4 years ago
- ☆101Oct 18, 2023Updated 2 years ago
- Cover's the top 10 "OWASP" security principle☆102Jan 27, 2020Updated 6 years ago
- 【Hello-CTF labs】PHP文件包含类靶场,各类协议的讲解以及基于协议的LFI/RFI☆105Aug 18, 2025Updated 5 months ago
- Official writeups for University CTF 2023: Brains & Bytes☆105Dec 4, 2024Updated last year
- ☆119Oct 27, 2022Updated 3 years ago
- List of Awesome Red Teaming Resources☆117Jan 2, 2019Updated 7 years ago
- Learn to Build Modern Full Stack Serverless Multi-Tenant SaaS Apps and APIs☆492Mar 29, 2022Updated 3 years ago
- Deepfake Image Detection with Keras & TensorFlow☆152Sep 17, 2025Updated 4 months ago