autistic-symposium / singularity.sh-blog-generatorLinks
πΎ old blog on security, hacking, and machine learning
β6Updated 9 months ago
Alternatives and similar repositories for singularity.sh-blog-generator
Users that are interested in singularity.sh-blog-generator are comparing it to the libraries listed below
Sorting:
- πΎ tool to manage GCP securityβ15Updated 9 months ago
- πΎ research on computation 3D photographyβ13Updated 9 months ago
- πΎ my old deep learning notebooks (e.g., tensorflow examples, caffee, deep art, numpy)β18Updated 8 months ago
- πΎ my loot-based erc-721 collection for the sunset of filmmaker daoβ14Updated 9 months ago
- πΎ CUDA examples for deep learning problemsβ12Updated 9 months ago
- πΎ monitor web server's log files against CSRF attacks (a modification of apache's mod_security to log these attacks)β14Updated 9 months ago
- πΎ quantum tensorflow machine learning deployment on k8sβ13Updated 8 months ago
- πΎ experimenting with steganography, astronomy, and art: a quick-and-dirty proof-of-concept using images from the hubble space telescopeβ20Updated 7 months ago
- πΎ my production-grade code an E2E distributed pipeline to extract and process surfing videos (surfline sessions)β13Updated 9 months ago
- πΎ code and notes on cloud microservices, orchestration (e.g., cloud, terraform, kubernetes, docker, data engineering)β19Updated 5 months ago
- πΎ back-of-the-envelope for a cryptocurrency coin mixerβ14Updated 9 months ago
- πΎ curated resources for the autistic cypherpunk nomads out thereβ22Updated 2 weeks ago
- πΎ bt3gl's personal resources and scripts over the years (e.g., dotfiles, shell, zsh, git, tmux, vim, vpn, chef, scripts, configs, rootinβ¦β16Updated 6 months ago
- πΎ resources and experiments for autonomous agents (e.g., language models, reinforcement learning, energy based models)β23Updated 4 months ago
- πΎ blockchain starting kit - python editionβ15Updated 7 months ago
- πΎ notes and resources on quantum computing (e.g., quantum information, post-quantum cryptography, implications on post-quantum and blockβ¦β23Updated 4 months ago
- πΎ notes and resources on how to rebuild our outdated systems (e.g., anarchy, state, utopia, technoliber*, plurality, daos, tokenomics, fβ¦β4Updated 5 months ago
- List of penetration testing tools.β23Updated 5 years ago
- Unofficial Kali Documentation Projectβ162Updated 10 years ago
- πΎ notes and resources on cryptography, cryptocurrencies, and cypherpunk living for the autistic cypherpunk anons out thereβ56Updated 4 months ago
- CyberCrowl is a python Web path scanner toolβ27Updated 6 years ago
- Proof of concepts of attacks against Wi-Fi implementationsβ140Updated 6 years ago
- AYY LMAOβ12Updated 9 years ago
- Node JS code for a set of Alexa voice skills designed to assist hackers and developers with common tasksβ56Updated 6 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, β¦β121Updated 6 years ago
- β92Updated 7 years ago
- β19Updated 3 years ago
- free exploit framework written use python language version 3.3β31Updated 7 years ago
- Resources for developers and security engineers to learn the ropes of application securityβ97Updated 6 years ago
- A talk+workshop on Accelerating Your Security Learning in 2017 given at null Bangalore 2017β13Updated 8 years ago