CS50’s Introduction to Artificial Intelligence with Python. This course explores the concepts and algorithms at the foundation of modern artificial intelligence, diving into the ideas that give rise to technologies like game-playing engines, handwriting recognition, and machine translation.
☆23Sep 13, 2021Updated 4 years ago
Alternatives and similar repositories for IntroToAI
Users that are interested in IntroToAI are comparing it to the libraries listed below
Sorting:
- TAXII 2.0 Server implemented in Node JS with MongoDB backend☆12Jan 3, 2023Updated 3 years ago
- un sensor pour récupérer les informations des prochaines marées☆12Jan 27, 2026Updated last month
- Library for extracting fields from Sigtran TCAP/INAP messages☆11Feb 17, 2026Updated 2 weeks ago
- In this training will be covered about a very basic step for malware analysis. Using several free tools to recognize malware behavior. Si…☆12May 25, 2016Updated 9 years ago
- Klara docker compose☆11May 19, 2020Updated 5 years ago
- ☆10Aug 9, 2024Updated last year
- Publicly accessible version of the FiGHT website.☆17Nov 14, 2025Updated 3 months ago
- Download a Bunch of Malware for Demos and Testing☆13Sep 28, 2018Updated 7 years ago
- Application for detecting command and control (C2) communication through network traffic analysis.☆15May 12, 2023Updated 2 years ago
- Power-Forensics is the Best Friend for Incident Responders to perform IR and collect evidences for Linux based host☆12Jun 2, 2023Updated 2 years ago
- ojjson is a library designed to facilitate JSON interactions with Ollama, a large language api (LLM). It leverages the power of Zod for s…☆12Nov 7, 2024Updated last year
- Scripts to help and speed up reversing activities☆13Jan 12, 2026Updated last month
- Go bindings for YARA☆14Aug 24, 2025Updated 6 months ago
- Summarize CTI reports with OpenAI☆18Mar 2, 2026Updated last week
- Python Library for ConfigExtractor☆15Feb 24, 2026Updated last week
- Automating Cyber Threat Intelligence Reporting with Natural Language Generation☆15Jan 24, 2024Updated 2 years ago
- The official repository of PowersheLLM, a model for Powershell maliciousness detection using fine-tuned LLM☆13Jun 6, 2024Updated last year
- IMRPOVED simple vector database made in numpy☆14Jun 2, 2024Updated last year
- Utilities for testing your Python functions for Scaleway Serverless Functions.☆14Mar 2, 2026Updated last week
- Various commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can al…☆14Aug 15, 2022Updated 3 years ago
- Documentation and tools to curate Sigma rules for Windows event logs into easier to parse rules.☆16Oct 22, 2025Updated 4 months ago
- Collection of Study Material for SANS - FOR610☆18Jul 31, 2020Updated 5 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆12Jul 1, 2021Updated 4 years ago
- ☆11May 14, 2021Updated 4 years ago
- Ransomware Chat Simulation☆20Mar 18, 2025Updated 11 months ago
- API hashing written in C to load APIs indirectly using CRC32 hashing☆15Jul 27, 2020Updated 5 years ago
- Easily scan with multiple yara rules from different sources.☆14Mar 9, 2024Updated 2 years ago
- Simple script that checks to see if there are any hidden/encoded strings in a file, useful for Steganography challenges.☆12May 28, 2021Updated 4 years ago
- ☆23Mar 17, 2024Updated last year
- automated-arancino is a lightweight analysis framework to automate malware experiments.☆16Apr 17, 2017Updated 8 years ago
- A collection of shellcode hashes☆17Aug 15, 2018Updated 7 years ago
- A tool to generate datasets and models based on vulnerabilities descriptions from @Vulnerability-Lookup.☆23Updated this week
- Common Malware Techniques☆13Mar 26, 2023Updated 2 years ago
- ☆21Nov 19, 2025Updated 3 months ago
- ☆15Jan 11, 2024Updated 2 years ago
- Notes about reverse engineering the Petya2017 ransomware☆20Jul 6, 2017Updated 8 years ago
- Code snippets for Qiling Tutorials☆21Aug 22, 2020Updated 5 years ago
- SigPloit: Telecom Signaling Exploitation Framework - SS7, GTP, Diameter & SIP☆15Dec 17, 2019Updated 6 years ago
- Tools and scripts to deploy and manage OpenRelik instances☆16Updated this week