JosefAlbers / VL-JEPAView external linksLinks
VL-JEPA (Vision-Language Joint Embedding Predictive Architecture) in MLX
☆68Dec 31, 2025Updated last month
Alternatives and similar repositories for VL-JEPA
Users that are interested in VL-JEPA are comparing it to the libraries listed below
Sorting:
- Proof of concept implementation of a cyber threat intelligence and incident handling platform☆11Feb 10, 2023Updated 3 years ago
- Security R package with a set of utils to analyse the different industry standards (MITRE and NIST).☆12May 27, 2019Updated 6 years ago
- A mathematical model for Fibonacci Retracement and location entry and exit formulation using ML☆10Aug 2, 2022Updated 3 years ago
- Demonstrating the possibility of stealing the private data of Harvard students and professors <3☆11Dec 13, 2015Updated 10 years ago
- A collection of prompts, templates and slash commands for supercharging Claude Code.☆22Jul 29, 2025Updated 6 months ago
- A curated list of awesome threat detection and hunting resources☆10Mar 23, 2018Updated 7 years ago
- Yahoo! Finance next gen python 3 / pandas market data downloader☆10Jul 23, 2021Updated 4 years ago
- 中国菜刀官网版本,官网下载,无后门,可验证主程序MD5值和SHA值☆12Apr 24, 2020Updated 5 years ago
- Example of portfolio backtesting using vectorbt☆11Oct 19, 2022Updated 3 years ago
- Batch-add multiple URLs to your Instapaper account☆13Nov 4, 2013Updated 12 years ago
- Red Teaming with Kali Linux. OS Customization, additional tools, and automated updates☆13Aug 7, 2016Updated 9 years ago
- Tools for converting/loading XML into neo4j☆11Nov 24, 2018Updated 7 years ago
- Juice Jacking / Automatic Android Rooting based on Intel Edison using dirty c0w☆11Nov 16, 2016Updated 9 years ago
- ☆13Feb 6, 2018Updated 8 years ago
- A full-featured and easy to use command-line package☆13Jan 2, 2021Updated 5 years ago
- IPython notebook support in IntelliJ☆14Feb 2, 2023Updated 3 years ago
- Script to pull newly-registered domains and check for similarity against a provided word list.☆13Aug 2, 2020Updated 5 years ago
- This is a repo for android spyware☆19Mar 27, 2019Updated 6 years ago
- ☆13Jul 26, 2024Updated last year
- Listed below are some extra phishing scenarios for wifiphisher these scenarios are only added to provide security awareness. It may not b…☆14Jul 3, 2017Updated 8 years ago
- Windows Offline Crash Dump☆17Aug 29, 2022Updated 3 years ago
- Stock trading bot using Alpaca API☆14Jan 10, 2020Updated 6 years ago
- Extract files from "broken" Zip file downloaded from Baidu Netdisk | 解压从百度网盘上批量下载的“损坏”的 zip 文件☆12Nov 8, 2020Updated 5 years ago
- Simple decrypter for Java AdWind, jRAT, jBifrost trojan☆17Jan 17, 2017Updated 9 years ago
- Uithub-Inspired Tool☆19Apr 17, 2025Updated 9 months ago
- ☆13Aug 28, 2019Updated 6 years ago
- ML pattern matching Python Library☆17Jul 17, 2017Updated 8 years ago
- Create Users in Active Directory This script creates 270 + users in Active Directory.☆19Oct 20, 2020Updated 5 years ago
- Investigation of the core VPN technologies | Penetration testing of an IPsec-VPN (using Ike-scan and psk-crack) | MitM Attack on PPTP-VPN…☆16May 15, 2016Updated 9 years ago
- Easily create command-line menus☆14Jun 7, 2019Updated 6 years ago
- ☆14Aug 31, 2018Updated 7 years ago
- Trading Starter Kit on Backtrader☆13Jun 3, 2020Updated 5 years ago
- An android app which allows NTFS pendrives and hard disks to be read on an OTG enabled mobile. Mobile must have Android 2.x and must be r…☆19Feb 21, 2012Updated 13 years ago
- A multi-agent framework built into GEMINI.md to run on the Gemini CLI☆42Oct 5, 2025Updated 4 months ago
- A stock trading app built with Flask