A complete, structured hub for learning Artificial Intelligence — covering AI, Machine Learning, Deep Learning, and Data Science with books, roadmaps, and curated resources from beginner to advanced.
☆88Mar 28, 2026Updated last week
Alternatives and similar repositories for ai-learning-roadmaps
Users that are interested in ai-learning-roadmaps are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Jul 1, 2015Updated 10 years ago
- My logstash plugins. Filter: sig (for security detect -> IOC, sig, New value, Reference, link, frequence, ...). Output: alert created by …☆10Jul 26, 2019Updated 6 years ago
- CTF Writeups☆12Feb 25, 2023Updated 3 years ago
- Kraken is an open-source modern math library that comes with a fast-fixed matrix class and math-related functions.☆31Sep 16, 2023Updated 2 years ago
- PortableMSVC is a command-line tool that automates downloading, caching, extracting, and managing fully portable Microsoft C/C++ toolchai…☆25Mar 29, 2026Updated last week
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Virustotal Lookup filter for Logstash☆16May 11, 2017Updated 8 years ago
- Snort + Pulledpork + Websnort in Docker!☆22Nov 9, 2021Updated 4 years ago
- A simple Linux in-memory .so loader☆33Mar 29, 2023Updated 3 years ago
- Python script to automatically create sigma rules from The hive observables☆25Mar 17, 2019Updated 7 years ago
- Monitoring attacks with elastick, kibana, grok, logstash and beats☆20Mar 2, 2017Updated 9 years ago
- Ahk-dumper is a tool to dump AutoHotKey code from the RDATA section of a PE file.☆20Feb 26, 2018Updated 8 years ago
- A not-curated list of cloud hacking labs☆26Apr 18, 2024Updated last year
- A pivot table plugin for Kibana 5☆24Aug 17, 2018Updated 7 years ago
- threadmap plugin for Volatility Foundation☆27Aug 23, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- vSphere Security Audit Scripts, Based on the vSphere Hardening Guide.☆26Feb 23, 2021Updated 5 years ago
- Some GSC plugins for Plutonium Black Ops 2☆19Dec 9, 2022Updated 3 years ago
- Reproducible and extensible BloodHound playbooks☆44Jan 20, 2020Updated 6 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Jan 11, 2017Updated 9 years ago
- This device silently hunts its prey, swooping in to gather RFID cards.☆33Apr 20, 2022Updated 3 years ago
- Logstash Configs used by Netflix☆31Mar 24, 2015Updated 11 years ago
- Examples for detection of hidden processes on windows☆35Jun 11, 2014Updated 11 years ago
- pollen - A command-line tool for interacting with TheHive☆36Jun 6, 2019Updated 6 years ago
- A C++ POC for process injection using NtCreateSectrion, NtMapViewOfSection and RtlCreateUserThread. Credit to @spotheplanet for his notes…☆45May 10, 2021Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Semgrep-based Policy Controller for Kubernetes☆47Apr 4, 2025Updated last year
- A simple toolkit on extracting RSA Software Tokens from RSA SecureID☆42May 6, 2020Updated 5 years ago
- Github action for linting AWS IAM policy documents☆38Jan 20, 2023Updated 3 years ago
- Command line tool for working with Panther rules and policies☆48Apr 1, 2026Updated last week
- Kibana HTML Widget Plugin☆30Apr 11, 2019Updated 6 years ago
- ☆39Aug 22, 2018Updated 7 years ago
- Notes on managing and coordinating the response to major cyber incidents☆41May 30, 2020Updated 5 years ago
- Gather and compile open source threat intelligence feeds.☆40Feb 19, 2022Updated 4 years ago
- A Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).☆65Apr 24, 2019Updated 6 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Common Vulnerability Scoring System (CVSS) made safe and highly efficient☆52Mar 30, 2026Updated last week
- An Elasticsearch QUEry Language☆57Jul 3, 2017Updated 8 years ago
- Find accounts using common and default passwords in Active Directory.☆71Sep 19, 2019Updated 6 years ago
- This is a Python port of lnk-parse-1.0, a tool to parse Windows .lnk files.☆80Apr 28, 2023Updated 2 years ago
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆92Nov 3, 2025Updated 5 months ago
- ☆94Oct 13, 2022Updated 3 years ago
- The Official Github Repository of Daemonlogger☆22Apr 15, 2021Updated 4 years ago