☆16Sep 26, 2017Updated 8 years ago
Alternatives and similar repositories for chapter_codes
Users that are interested in chapter_codes are comparing it to the libraries listed below
Sorting:
- 2019 딥러닝-비전처리 홀로서기 특강에 사용된 Lecture Note 및 Code Repository입니다.☆12Sep 7, 2019Updated 6 years ago
- 공학수학 강의노트☆19Feb 27, 2024Updated 2 years ago
- A class validation and transformation library, to ensure secure data structures in Python.☆10May 16, 2024Updated last year
- ☆11Aug 31, 2019Updated 6 years ago
- 🕹 Pikachu-volleyball game-based multi-agent RL environment using PettingZoo☆11Sep 29, 2024Updated last year
- kdb Visual Studio Code extension☆22Feb 20, 2026Updated 2 weeks ago
- Python's dependable dependency injection container for managing lifecycles and registrations.☆14May 16, 2024Updated last year
- ☆22Nov 22, 2025Updated 3 months ago
- Wafid allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.☆10Oct 19, 2020Updated 5 years ago
- The project is advised by Professor Robert Engle in his FINANCIAL ECONOMETRICS PhD course. I made comparison between the performance of d…☆10Sep 14, 2018Updated 7 years ago
- netbeacon - monitoring your network capture, NIDS or network analysis process☆19Oct 26, 2013Updated 12 years ago
- 🎲 Woodoku-based reinforcement learning environment using Gymnasium☆10Sep 28, 2024Updated last year
- ☆15Dec 16, 2022Updated 3 years ago
- A collection of short scripts for analysis, encryption and forensics, that can be used for CTF and/or security assessments☆10Sep 22, 2015Updated 10 years ago
- Magento Security Scanner☆13Jan 10, 2022Updated 4 years ago
- ☆11Jan 5, 2022Updated 4 years ago
- ☆12Feb 23, 2026Updated last week
- Source code for MA4270: Data Modelling and Computation on Transformers and Nadaraya-Watson Kernel Regression☆19May 29, 2024Updated last year
- Ios 11-11.1.2 Jailbreak And ios 10-10.3.3 jailbreak. ORIGINAL PROJECT: https://github.com/JosephShenton/C0F3☆13Feb 8, 2018Updated 8 years ago
- Verified interval arithmetic for Lean 4 — prove bounds on exp, sin, cos, find roots, all machine-checked☆35Updated this week
- Code for Conformal Counterfactual Inference under Hidden Confounding (KDD’24)☆11Aug 30, 2024Updated last year
- ☆15Oct 18, 2020Updated 5 years ago
- Decoupled AI copilot for pentesting & CTFs. Sidecar tails your shell history, parses tool outputs, grounds suggestions in your notes, and…☆13Nov 21, 2025Updated 3 months ago
- Simply runs through a wordlist of default/common group IDs and parses each hash to a separate file. Then it runs through the hashes with …☆10Feb 15, 2017Updated 9 years ago
- Lookup donation history of a Political Action Committee to specific US federal election candidates using data sourced directly from the F…☆14Nov 14, 2022Updated 3 years ago
- A Shodan-based tool to discover publicly exposed Ollama instances and list available LLM models.☆20May 27, 2025Updated 9 months ago
- Oracle Attacks Tool☆13Aug 9, 2016Updated 9 years ago
- Windows low level keyboard hooking component☆14Feb 5, 2017Updated 9 years ago
- based on Differential Cryptanalysis of the Full 16-round DES(Eli Biham / Adi Shamir), all comments and report are written in Korean.☆10Dec 19, 2022Updated 3 years ago
- Simple bash script to enumerate Linux machines☆13Nov 5, 2018Updated 7 years ago
- ☆12Jul 11, 2025Updated 7 months ago
- A collection of vulnerable web applications in Node.js to practice security fundamentals☆13May 5, 2016Updated 9 years ago
- Stealth is a File Integrity scanner performing its work in a stealthy way.☆12Jun 25, 2018Updated 7 years ago
- Portfolio Optimization on a Quantum computer.☆15Apr 15, 2022Updated 3 years ago
- Athc0n 2012 CTF setups☆15Mar 12, 2015Updated 10 years ago
- ☆17Jul 12, 2022Updated 3 years ago
- really ?☆12Feb 29, 2024Updated 2 years ago
- All Cryptography Algorithms are implemented in C.☆13Mar 28, 2021Updated 4 years ago
- This repository contains a python3 script that is used to deploy a GNS3 topology from a YAML file using GNS3 REST API.☆14Dec 8, 2022Updated 3 years ago