The old school Tetris game in addition with an AI that learns evolutionary how to play this game
☆24Oct 28, 2019Updated 6 years ago
Alternatives and similar repositories for TetrisAI
Users that are interested in TetrisAI are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆18Jun 21, 2019Updated 6 years ago
- adversarial machine learning for anti-malware software☆12May 17, 2018Updated 8 years ago
- Open-CTF based on Christmas CTF Platform☆11Feb 25, 2016Updated 10 years ago
- Tool for analysis of Windows Prefetch files☆26Nov 11, 2018Updated 7 years ago
- SUB/PUSH/POP based ASCII shellcode encoder☆23Sep 7, 2017Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- dForensics Tools☆22Sep 12, 2015Updated 10 years ago
- CVE-2017-9791☆27Jul 8, 2017Updated 8 years ago
- Indicators of Compromise (IOCs) for malware we have researched☆12Aug 8, 2023Updated 2 years ago
- Eclipse plugin suite providing integration with security testing tools.☆11Apr 23, 2016Updated 10 years ago
- A simple script for exploit RCE for Struts 2 S2-053(CVE-2017-12611)☆37Sep 8, 2017Updated 8 years ago
- ☆38Jul 4, 2016Updated 9 years ago
- Samsung CTF 2017 Problems. https://sctf.codeground.org☆24Sep 3, 2018Updated 7 years ago
- BADFET☆45Jul 12, 2017Updated 8 years ago
- Presentations☆10Oct 2, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- This is Chrome extension for detecting CSRF vulnerabilities.☆10Jun 23, 2017Updated 8 years ago
- ctfs write-up☆30Jul 21, 2023Updated 2 years ago
- IronAivika (formerly known as Aivika for .NET)☆10Apr 25, 2026Updated 3 weeks ago
- Hue/wheel based Color Picker control for Windows 10 UWP applications.☆10Jul 9, 2022Updated 3 years ago
- C# Code Compiler | Code Analysis and Code Compiler for Eval-Expression.NET and Eval-SQL.NET☆12Mar 20, 2024Updated 2 years ago
- A PoC demonstrating techniques exploiting CVE-2016-5696 Off-Path TCP Exploits: Global Rate Limit Considered Dangerous☆40Aug 23, 2016Updated 9 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 7 years ago
- ☆51Sep 23, 2017Updated 8 years ago
- ☆35Jul 18, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Get detailed information about a Twitter user activity☆17Dec 14, 2017Updated 8 years ago
- ☆13Jul 14, 2020Updated 5 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Jul 27, 2018Updated 7 years ago
- PyMal is a python based interactive Malware Analysis Framework. It is built on the top of three pure python programes Pefile, Pydbg and V…☆44Jul 10, 2016Updated 9 years ago
- Telnet implementation for node.js, based on node-telnet☆18Sep 3, 2015Updated 10 years ago
- ☆20Jun 2, 2016Updated 9 years ago
- Curriculum Vitae European & Biography☆35Aug 11, 2023Updated 2 years ago
- ☆47May 18, 2020Updated 6 years ago
- Building Emulators inF#☆11Dec 23, 2020Updated 5 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- A .NET framework for composing, evaluating, inspecting and persisting computational experiments which are represented as a dataflow.☆21Nov 28, 2022Updated 3 years ago
- Uses Google to search for .apks hosted on websites and downloads them☆19Aug 2, 2014Updated 11 years ago
- Sample VSTS extension: User Voice UI☆17Nov 28, 2022Updated 3 years ago
- Simple list of decrypt tools that could help recover data encrypted by ransomwares☆17Apr 1, 2016Updated 10 years ago
- Frontend for Codex Gigas☆21Mar 6, 2017Updated 9 years ago
- Blazor Hackernews Clone☆17Dec 23, 2018Updated 7 years ago
- Motion analysis using deep neural networks☆12Jun 9, 2016Updated 9 years ago