Stanford's Machine Learning Exercises
☆12Apr 7, 2020Updated 5 years ago
Alternatives and similar repositories for CourseraMachineLearning
Users that are interested in CourseraMachineLearning are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆55May 30, 2017Updated 8 years ago
- NLog Target for GrayLog2☆17Mar 29, 2019Updated 6 years ago
- A Django package that force authentication requirement by default on every single endpoint.☆12Sep 8, 2019Updated 6 years ago
- Yet Another Linux Virtual Machine for Mobile Application Pentesting and Mobile Malware Analysis☆114Apr 25, 2016Updated 9 years ago
- 👻👁🔍📡 If an attacker has created a fake enterprise wireless network, my goal is to deceive him.☆18Feb 10, 2019Updated 7 years ago
- BlizzardWrap - A CLI tool for encoding and decoding (supports several formats/algos)☆16Jun 19, 2021Updated 4 years ago
- ☆17Jan 29, 2023Updated 3 years ago
- Stuff you might use when exploiting software☆81Nov 8, 2015Updated 10 years ago
- A traffic analyzer to evade Empire's communication from Anomaly-Based IDS☆108Aug 13, 2018Updated 7 years ago
- Telegram notification for metasploit sessions.☆13Nov 22, 2018Updated 7 years ago
- Python-based CLI Password Analyser (Reporting Tool)☆32Aug 13, 2021Updated 4 years ago
- ☆32May 9, 2021Updated 4 years ago
- Ant Media Publish Play Example with React Js☆11Dec 24, 2020Updated 5 years ago
- ☆15Jul 13, 2023Updated 2 years ago
- JavaScript ile Programlamaya Giriş Kitabı☆14Aug 31, 2019Updated 6 years ago
- React Native - Redux Thunk - Hooks - Axios - Router Flux - Masonry Layout and Dark Mode☆10Jan 5, 2023Updated 3 years ago
- A playground to practice SSRF Attacks against web apps☆17Oct 15, 2018Updated 7 years ago
- MacaronSwap Smart Contracts☆10Nov 3, 2025Updated 4 months ago
- Akgulyzer; komut satiri rastgele metin uretici ve encoder.☆20Feb 10, 2015Updated 11 years ago
- A repo for security analytics & threat hunting resources☆21Sep 25, 2018Updated 7 years ago
- Implementation of the Label consistent KSVD algorithm proposed by Zhuolin Jiang, Zhe Lin and Larry S. Davis.☆18Nov 16, 2018Updated 7 years ago
- A RADIUS authentication server audit tool☆79Oct 15, 2018Updated 7 years ago
- Utility to pull disclosed vulnerabilities from HackerOne private programs - for personal use only☆13Aug 22, 2021Updated 4 years ago
- Firebase veritabanı kullanarak, yemek tarifleri ekleyip silebileceğimiz kişiye özel bir not defteri uygulamasıdır.☆12Feb 24, 2020Updated 6 years ago
- ☆19Mar 31, 2022Updated 3 years ago
- ☆10Jun 30, 2021Updated 4 years ago
- Wraps github api for openly available information about an organization, user, or repo☆128May 22, 2023Updated 2 years ago
- This is webrtc video chat room ( Group Call ) for ant media server.☆20Apr 2, 2019Updated 6 years ago
- ☆44Sep 25, 2025Updated 5 months ago
- Extract indicators of compromise from text, including "escaped" ones.☆163Apr 19, 2020Updated 5 years ago
- Slide Decks and Supporting Content of talks given for Bugcrowd☆17Feb 12, 2020Updated 6 years ago
- Port of webrtc-adaptor (AntMedia) to react-native using react-native-webrtc☆23Mar 29, 2021Updated 4 years ago
- ☆29Nov 4, 2020Updated 5 years ago
- Fetch Metadata server security middleware for Go☆11Oct 16, 2019Updated 6 years ago
- Check for know iframeBuster XSS☆12Sep 25, 2024Updated last year
- Lightweight tool deployed with Microsoft Intune to manage e-mail signatures for Outlook☆79Feb 25, 2023Updated 3 years ago
- Captchasec is a captcha difficulty tester. It uses de-captcher.com as an OCR server.☆27Nov 18, 2023Updated 2 years ago
- A better dns bruteforcer written in golang☆13Nov 4, 2018Updated 7 years ago
- From zero to hero Python Course☆19Feb 25, 2022Updated 4 years ago