AuburnACM / auacm
The Auburn ACM Website
☆15Updated 6 years ago
Related projects: ⓘ
- ☆49Updated 5 years ago
- ☆28Updated 8 years ago
- Malware Analysis Tool using Function Level Fuzzy Hashing☆191Updated 8 years ago
- We try to break the recaptcha for the Merry Christmas for all!☆294Updated 7 years ago
- @twosigma's first artificial intelligence programming challenge☆191Updated 5 years ago
- ☆217Updated this week
- System Architecture Mapper☆175Updated 6 years ago
- search key to restore petya encrypted mft☆612Updated 8 years ago
- A single handwritten digit classifier, using the MNIST dataset. Pure Numpy.☆785Updated 4 years ago
- ☆616Updated this week
- stockfighter API wrapper☆11Updated last year
- ☆321Updated this week
- ☆406Updated this week
- Adds some much needed Chris to an image.☆254Updated 6 years ago
- Notes on BangBangCon 2016☆55Updated 8 years ago
- The Hacker's Sandbox☆124Updated 7 years ago
- The DrK Attack - Proof of concept☆342Updated 2 years ago
- ☆10Updated 9 years ago
- Blogging about reversing "script kiddie" style malware.☆95Updated 9 years ago
- Being a scraper to save a BBC good food recipe☆163Updated 8 years ago
- An implementation of the Advanced Encryption Standard (AES) algorithm meant for study to go along with "A Stick Figure Guide to the Advan…☆415Updated 14 years ago
- ☆240Updated this week
- ☆116Updated 8 years ago
- Find your Facebook friends' Tinder profiles. Don't actually use this by the way that's weird. Not even in a good way.☆701Updated 6 years ago
- ☆679Updated this week
- Machine learning algorithm to connect anonymous accounts to real names☆95Updated 8 years ago
- Helping students assess course difficulty and workload.☆36Updated 6 years ago
- GATEKEEPER: Inline and on-target defense☆119Updated 2 years ago
- Don't Skype & Type! Keyboard acoustic eavesdropping tool.☆317Updated 5 years ago