The old school Tetris game in addition with an AI that learns evolutionary how to play this game
☆24Oct 28, 2019Updated 6 years ago
Alternatives and similar repositories for TetrisAI
Users that are interested in TetrisAI are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆18Jun 21, 2019Updated 6 years ago
- adversarial machine learning for anti-malware software☆12May 17, 2018Updated 7 years ago
- Open-CTF based on Christmas CTF Platform☆11Feb 25, 2016Updated 10 years ago
- Tool for analysis of Windows Prefetch files☆26Nov 11, 2018Updated 7 years ago
- SUB/PUSH/POP based ASCII shellcode encoder☆23Sep 7, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- dForensics Tools☆22Sep 12, 2015Updated 10 years ago
- Proof of Concept example of Android Malware used for Research Purposes☆22Dec 22, 2016Updated 9 years ago
- CVE-2017-9791☆27Jul 8, 2017Updated 8 years ago
- 2018 TenDollar CTF☆30Dec 5, 2018Updated 7 years ago
- Indicators of Compromise (IOCs) for malware we have researched☆12Aug 8, 2023Updated 2 years ago
- A simple script for exploit RCE for Struts 2 S2-053(CVE-2017-12611)☆37Sep 8, 2017Updated 8 years ago
- ☆38Jul 4, 2016Updated 9 years ago
- Samsung CTF 2017 Problems. https://sctf.codeground.org☆24Sep 3, 2018Updated 7 years ago
- BADFET☆45Jul 12, 2017Updated 8 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Presentations☆10Oct 2, 2017Updated 8 years ago
- This is Chrome extension for detecting CSRF vulnerabilities.☆10Jun 23, 2017Updated 8 years ago
- ctfs write-up☆30Jul 21, 2023Updated 2 years ago
- ☆10Jul 6, 2016Updated 9 years ago
- A PoC demonstrating techniques exploiting CVE-2016-5696 Off-Path TCP Exploits: Global Rate Limit Considered Dangerous☆40Aug 23, 2016Updated 9 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 6 years ago
- ☆51Sep 23, 2017Updated 8 years ago
- ☆35Jul 18, 2017Updated 8 years ago
- ☆13Jul 14, 2020Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Jul 27, 2018Updated 7 years ago
- PyMal is a python based interactive Malware Analysis Framework. It is built on the top of three pure python programes Pefile, Pydbg and V…☆44Jul 10, 2016Updated 9 years ago
- Telnet implementation for node.js, based on node-telnet☆18Sep 3, 2015Updated 10 years ago
- ☆20Jun 2, 2016Updated 9 years ago
- Curriculum Vitae European & Biography☆35Aug 11, 2023Updated 2 years ago
- ☆47May 18, 2020Updated 5 years ago
- Uses Google to search for .apks hosted on websites and downloads them☆19Aug 2, 2014Updated 11 years ago
- Simple list of decrypt tools that could help recover data encrypted by ransomwares☆17Apr 1, 2016Updated 10 years ago
- Frontend for Codex Gigas☆21Mar 6, 2017Updated 9 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Break and Elevation of Privilege the API v2 using JSON Web Token (JWT)☆15Jul 8, 2017Updated 8 years ago
- ☆15Jul 6, 2015Updated 10 years ago
- 微软7月布丁增加内存延迟释放机制☆11Jul 19, 2014Updated 11 years ago
- ☆56Jul 19, 2017Updated 8 years ago
- ☆12Sep 8, 2020Updated 5 years ago
- Convert any image into a Region Adjacency Graph (RAG)☆12Apr 27, 2020Updated 6 years ago
- Notepad++ Syntax Highlighting for Languages Used by Cyber Security Professionals☆14May 31, 2020Updated 5 years ago