Billy1900 / Awesome-Machine-LearningView external linksLinks
Learning tutorial for machine learning beginners
☆15May 14, 2022Updated 3 years ago
Alternatives and similar repositories for Awesome-Machine-Learning
Users that are interested in Awesome-Machine-Learning are comparing it to the libraries listed below
Sorting:
- ☆37Mar 16, 2022Updated 3 years ago
- github军火库☆21May 24, 2017Updated 8 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆10Jul 6, 2022Updated 3 years ago
- Source code of the paper "FirmRCA: Towards Post-Fuzzing Analysis on ARM Embedded Firmware with Efficient Event-based Fault Localization"☆13Jan 6, 2026Updated last month
- Remove API hooks from a Beacon process.☆14Sep 18, 2021Updated 4 years ago
- Another Portable Executable files analysing stuff☆21May 28, 2011Updated 14 years ago
- ☆16Sep 16, 2021Updated 4 years ago
- 该项目实现了隐私保护和可验证的卷积神经网络(CNN)测试,旨在使模型开发者能够在多个测试者提供的非公开数据上向用户证明CNN性能的真实性,同时保护模型和数据的隐私。☆15Oct 23, 2023Updated 2 years ago
- [USENIX Security 2024] PrivImage: Differentially Private Synthetic Image Generation using Diffusion Models with Semantic-Aware Pretrainin…☆23Nov 10, 2024Updated last year
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆25May 19, 2022Updated 3 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆21Feb 5, 2017Updated 9 years ago
- ☆25Apr 22, 2023Updated 2 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆32Aug 29, 2016Updated 9 years ago
- Useful tools for differential privacy☆219Sep 11, 2022Updated 3 years ago
- [IEEE S&P 22] "LinkTeller: Recovering Private Edges from Graph Neural Networks via Influence Analysis" by Fan Wu, Yunhui Long, Ce Zhang, …☆23Sep 7, 2021Updated 4 years ago
- ☆41Jun 13, 2023Updated 2 years ago
- Private Inference on Transformer☆30Jun 13, 2023Updated 2 years ago
- APOLOGEE is a Python script and Metasploit module that enumerates a hidden directory on Siemens APOGEE PXC BACnet Automation Controllers …☆50May 22, 2025Updated 8 months ago
- ☆45Jul 9, 2021Updated 4 years ago
- ☆50Sep 8, 2023Updated 2 years ago
- DiAne is a smart fuzzer for IoT devices☆42Apr 3, 2024Updated last year
- Differential private machine learning☆200Feb 10, 2022Updated 4 years ago
- Sysmon Splunk App☆47Aug 21, 2018Updated 7 years ago
- Analytic calibration for differential privacy with Gaussian perturbations☆51Oct 7, 2018Updated 7 years ago
- Locally Private Graph Neural Networks (ACM CCS 2021)☆50Jul 2, 2025Updated 7 months ago
- 网站漏洞扫描平台☆47Jan 29, 2017Updated 9 years ago
- Concentrated Differentially Private Gradient Descent with Adaptive per-iteration Privacy Budget☆49Mar 1, 2018Updated 7 years ago
- Penetration Testing/Security Cheatsheets☆64Oct 31, 2015Updated 10 years ago
- ☆65Jun 21, 2024Updated last year
- Testing vulnerabilities in devices and routers connected to the Internet.☆63Nov 19, 2015Updated 10 years ago
- Exploits pack for the Windows Kernel mode driver HackSysExtremeVulnerableDriver written for educational purposes.☆66Oct 24, 2021Updated 4 years ago
- A large-scale visual-language face dataset with fine-grained annotations (ICCV 2021)☆70Jul 18, 2022Updated 3 years ago
- Freely available programming books☆69Oct 3, 2018Updated 7 years ago
- ☆82Sep 3, 2021Updated 4 years ago
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆91Nov 3, 2025Updated 3 months ago
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆90Dec 15, 2022Updated 3 years ago
- Efficient and Interactive Zero-Knowledge Proofs☆103Nov 13, 2025Updated 3 months ago
- A list of web application security☆80Oct 8, 2018Updated 7 years ago
- Some tools to monitor BillGates CnC servers☆137Apr 14, 2014Updated 11 years ago