AbdelkaderMH / DomURLs_BERTView external linksLinks
☆20Feb 5, 2026Updated last week
Alternatives and similar repositories for DomURLs_BERT
Users that are interested in DomURLs_BERT are comparing it to the libraries listed below
Sorting:
- GPT2 Inference Implementation in Pure C☆31Jun 23, 2025Updated 7 months ago
- Group review spammer detection☆10Sep 9, 2019Updated 6 years ago
- NCTF 2024 challenges and writeups☆10Apr 11, 2025Updated 10 months ago
- ☆12Jan 8, 2025Updated last year
- CTF MISC 方向从入门到精通指南,个人 MISC 知识点总结☆20Sep 15, 2025Updated 4 months ago
- MSIEVE: A Library for Factoring Large Integers☆14Apr 7, 2023Updated 2 years ago
- ☆16Mar 27, 2025Updated 10 months ago
- LilCTF 2025 challenges, source code, official writeups, and players' writeups.☆27Oct 10, 2025Updated 4 months ago
- Tools for the automatic detection of speech-related inhalation events and characterisation of the speech respiratory cycle.☆11Feb 17, 2024Updated last year
- ☆11Aug 10, 2021Updated 4 years ago
- Revisiting Differential-Linear Attacks via a Boomerang Perspective☆11Nov 26, 2025Updated 2 months ago
- ☆18Jan 2, 2025Updated last year
- ☆17Aug 9, 2024Updated last year
- ☆17Aug 30, 2018Updated 7 years ago
- Domain Generation Algorithm official repository. Please visit the WIKI page for more information☆12Jul 22, 2023Updated 2 years ago
- Domain Graph core library☆17Jan 14, 2023Updated 3 years ago
- Generate network packets using generative modeling☆15May 17, 2023Updated 2 years ago
- Homemade implementation of Square Attack against 4 rounds AES☆15Feb 2, 2020Updated 6 years ago
- 该资源是作者收集各种类型CTF比赛的常用工具,包括Web、RE、Misc、Crypto、PWN、IOT等方向,非常适合安全初学者。希望对您有所帮助,也欢迎大家补充~☆13Aug 25, 2024Updated last year
- The Domain Name System is a fundamental component of the internet since it maps the easy-to-remember domain names to IP addresses. Theref…☆16Oct 2, 2020Updated 5 years ago
- Breaking Semantic Artifacts for Generalized AI-generated Image Detection☆19Dec 30, 2024Updated last year
- A Nuclei template to detect CVE-2025-29927 the Next.js authentication bypass vulnerability☆18Mar 23, 2025Updated 10 months ago
- ☆32Jul 2, 2016Updated 9 years ago
- A collection of prompts for people that want to learn more about cybersecurity topics.☆16Mar 31, 2023Updated 2 years ago
- Detection of malicious domains via character co-occurrence analysis in URL's.☆11Mar 22, 2016Updated 9 years ago
- ☆18Jul 12, 2022Updated 3 years ago
- Numerical Linear Algebra Notes CME 302 Stanford☆25Nov 20, 2025Updated 2 months ago
- ☆16Jan 25, 2023Updated 3 years ago
- 网络安全/无线网络安全 论文阅读笔记归档☆13Oct 19, 2021Updated 4 years ago
- Python's library written in Rust to quickly factor `n = pq` when around >50% bits of `p` and `q` are known which are distributed at rando…☆19Jul 16, 2021Updated 4 years ago
- URL / IP / Email defanging with Golang. Make IoC harmless.☆20Sep 9, 2025Updated 5 months ago
- Windows Privilege Escalation☆22Jun 7, 2022Updated 3 years ago
- Given p xor q and n=p*q for two unknown primes p and q, factor n and output p and q.☆22Jan 8, 2017Updated 9 years ago
- develop 1) an on-path DNS packet injector, and 2) a passive DNS poisoning attack detector. Part 1: The DNS packet injector you are goin…☆18Apr 21, 2018Updated 7 years ago
- Cough detection with Log Mel Spectrogram, Wavelet Transform, Deep learning and Transfer learning techniques☆17Dec 12, 2020Updated 5 years ago
- ☆30Feb 5, 2026Updated last week
- Project to save innocent infant lives using Cardiotocography and CNN image classification☆21May 22, 2019Updated 6 years ago
- Windows注册表取证分析工具☆19May 1, 2017Updated 8 years ago
- DinoDate is "a fun site for finding your perfect Dino partner". It is a learning platform to showcase Oracle Database features using exam…☆16Apr 7, 2021Updated 4 years ago