The old school Tetris game in addition with an AI that learns evolutionary how to play this game
☆24Oct 28, 2019Updated 6 years ago
Alternatives and similar repositories for TetrisAI
Users that are interested in TetrisAI are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆18Jun 21, 2019Updated 6 years ago
- adversarial machine learning for anti-malware software☆12May 17, 2018Updated 7 years ago
- Tool for analysis of Windows Prefetch files☆26Nov 11, 2018Updated 7 years ago
- SUB/PUSH/POP based ASCII shellcode encoder☆23Sep 7, 2017Updated 8 years ago
- dForensics Tools☆22Sep 12, 2015Updated 10 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- The CMU Link Grammar natural language parser☆12May 31, 2024Updated last year
- Proof of Concept example of Android Malware used for Research Purposes☆22Dec 22, 2016Updated 9 years ago
- Tensorflow NLP, Thai Word Embedding☆11Jun 16, 2017Updated 8 years ago
- Shell script to create an onion-router for your Raspberry Pi from a stock Moebius image☆28Jul 10, 2014Updated 11 years ago
- CVE-2017-9791☆27Jul 8, 2017Updated 8 years ago
- Backtranslations of IMDB movie reviews for Data Augmentation Purposes☆10Apr 1, 2019Updated 7 years ago
- Korean Chess AI using AlphaGo Zero algorithms.☆28Dec 13, 2018Updated 7 years ago
- 2018 TenDollar CTF☆30Dec 5, 2018Updated 7 years ago
- ☆14Dec 23, 2024Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Indicators of Compromise (IOCs) for malware we have researched☆11Aug 8, 2023Updated 2 years ago
- Eclipse plugin suite providing integration with security testing tools.☆11Apr 23, 2016Updated 9 years ago
- Code for Context is Everything: Finding Meaning Statistically in Semantic Spaces.☆16Apr 28, 2018Updated 7 years ago
- A simple script for exploit RCE for Struts 2 S2-053(CVE-2017-12611)☆37Sep 8, 2017Updated 8 years ago
- NLP course at Chulalongkorn University 2019☆21Mar 28, 2019Updated 7 years ago
- ☆38Jul 4, 2016Updated 9 years ago
- Samsung CTF 2017 Problems. https://sctf.codeground.org☆24Sep 3, 2018Updated 7 years ago
- Thai in spaCy☆14Apr 1, 2019Updated 7 years ago
- This is Chrome extension for detecting CSRF vulnerabilities.☆10Jun 23, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ctfs write-up☆30Jul 21, 2023Updated 2 years ago
- A PoC demonstrating techniques exploiting CVE-2016-5696 Off-Path TCP Exploits: Global Rate Limit Considered Dangerous☆40Aug 23, 2016Updated 9 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 6 years ago
- ☆51Sep 23, 2017Updated 8 years ago
- ☆35Jul 18, 2017Updated 8 years ago
- Get detailed information about a Twitter user activity☆17Dec 14, 2017Updated 8 years ago
- ☆13Jul 14, 2020Updated 5 years ago
- PyMal is a python based interactive Malware Analysis Framework. It is built on the top of three pure python programes Pefile, Pydbg and V…☆44Jul 10, 2016Updated 9 years ago
- Telnet implementation for node.js, based on node-telnet☆18Sep 3, 2015Updated 10 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Curriculum Vitae European & Biography☆35Aug 11, 2023Updated 2 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Jul 27, 2018Updated 7 years ago
- ☆47May 18, 2020Updated 5 years ago
- Uses Google to search for .apks hosted on websites and downloads them☆19Aug 2, 2014Updated 11 years ago
- Simple list of decrypt tools that could help recover data encrypted by ransomwares☆17Apr 1, 2016Updated 10 years ago
- Frontend for Codex Gigas☆21Mar 6, 2017Updated 9 years ago
- Break and Elevation of Privilege the API v2 using JSON Web Token (JWT)☆15Jul 8, 2017Updated 8 years ago