The old school Tetris game in addition with an AI that learns evolutionary how to play this game
☆24Oct 28, 2019Updated 6 years ago
Alternatives and similar repositories for TetrisAI
Users that are interested in TetrisAI are comparing it to the libraries listed below
Sorting:
- ☆18Jun 21, 2019Updated 6 years ago
- adversarial machine learning for anti-malware software☆12May 17, 2018Updated 7 years ago
- Open-CTF based on Christmas CTF Platform☆11Feb 25, 2016Updated 10 years ago
- Tool for analysis of Windows Prefetch files☆26Nov 11, 2018Updated 7 years ago
- SUB/PUSH/POP based ASCII shellcode encoder☆23Sep 7, 2017Updated 8 years ago
- dForensics Tools☆22Sep 12, 2015Updated 10 years ago
- Proof of Concept example of Android Malware used for Research Purposes☆23Dec 22, 2016Updated 9 years ago
- CVE-2017-9791☆27Jul 8, 2017Updated 8 years ago
- 2018 TenDollar CTF☆30Dec 5, 2018Updated 7 years ago
- Indicators of Compromise (IOCs) for malware we have researched☆11Aug 8, 2023Updated 2 years ago
- Eclipse plugin suite providing integration with security testing tools.☆11Apr 23, 2016Updated 9 years ago
- Data Science Foundations: Python Scientific Stack☆11Jun 2, 2022Updated 3 years ago
- A simple script for exploit RCE for Struts 2 S2-053(CVE-2017-12611)☆37Sep 8, 2017Updated 8 years ago
- ☆38Jul 4, 2016Updated 9 years ago
- Samsung CTF 2017 Problems. https://sctf.codeground.org☆24Sep 3, 2018Updated 7 years ago
- BADFET☆45Jul 12, 2017Updated 8 years ago
- Presentations☆10Oct 2, 2017Updated 8 years ago
- This is Chrome extension for detecting CSRF vulnerabilities.☆10Jun 23, 2017Updated 8 years ago
- ctfs write-up☆30Jul 21, 2023Updated 2 years ago
- PREVIEW - Run Bonobo data processing graphs in docker containers.☆13Dec 8, 2022Updated 3 years ago
- ☆10Jul 6, 2016Updated 9 years ago
- Test environment for rtorrent using Vagrant.☆14Oct 22, 2019Updated 6 years ago
- A PoC demonstrating techniques exploiting CVE-2016-5696 Off-Path TCP Exploits: Global Rate Limit Considered Dangerous☆40Aug 23, 2016Updated 9 years ago
- ☆51Sep 23, 2017Updated 8 years ago
- ☆35Jul 18, 2017Updated 8 years ago
- Get detailed information about a Twitter user activity☆17Dec 14, 2017Updated 8 years ago
- Tiny library to create argparse.ArgumentParser automatically from annotations .☆14Jul 3, 2025Updated 8 months ago
- a small, flat-file Markdown wiki. easy.☆14Aug 15, 2019Updated 6 years ago
- ☆13Jul 14, 2020Updated 5 years ago
- Telnet implementation for node.js, based on node-telnet☆18Sep 3, 2015Updated 10 years ago
- PyMal is a python based interactive Malware Analysis Framework. It is built on the top of three pure python programes Pefile, Pydbg and V…☆44Jul 10, 2016Updated 9 years ago
- Curriculum Vitae European & Biography☆35Aug 11, 2023Updated 2 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Jul 27, 2018Updated 7 years ago
- ☆47May 18, 2020Updated 5 years ago
- UNIX top-like app for nginx (or Apache, if you wish) access logs.☆14Sep 3, 2020Updated 5 years ago
- Uses Google to search for .apks hosted on websites and downloads them☆19Aug 2, 2014Updated 11 years ago
- Simple list of decrypt tools that could help recover data encrypted by ransomwares☆17Apr 1, 2016Updated 9 years ago
- FLR documentation: tutorials, manuals, examples and others☆10Feb 20, 2026Updated last month
- Frontend for Codex Gigas☆21Mar 6, 2017Updated 9 years ago