☆29May 5, 2017Updated 8 years ago
Alternatives and similar repositories for aiengine
Users that are interested in aiengine are comparing it to the libraries listed below
Sorting:
- Dump and parse embedded certificates from Windows binaries☆11Jan 3, 2012Updated 14 years ago
- DSIG digitial signatures for Truetype .TTF and Opentype .OTF fonts☆12Sep 22, 2016Updated 9 years ago
- Implementation example of Distributed Tensorflow☆10Jul 22, 2017Updated 8 years ago
- ☆10Jul 2, 2020Updated 5 years ago
- Perl utilities to retrieve and/or set basic and enhanced telnet passwords (amongst others)☆16Jun 16, 2014Updated 11 years ago
- A desktop App to add STIX-2 objects to TAXII-2.0 servers☆11Mar 13, 2019Updated 7 years ago
- Scripts from my private ~/bin-tage☆22Feb 21, 2026Updated last month
- allow running docker bind volumes thru Hashicorp's NOMAD using the raw_exec driver☆13Nov 6, 2018Updated 7 years ago
- This Repository gives the best and possible strategies against hunting the ransomware☆26Aug 23, 2022Updated 3 years ago
- Solves the longest common subsequence problem in Python☆19Dec 16, 2011Updated 14 years ago
- Community-based CybergON-powered Suricata rules☆12Jul 5, 2022Updated 3 years ago
- Reconstructing the content of image based on paper "Understanding Deep Image Representations by Inverting Them"☆11Jul 30, 2018Updated 7 years ago
- Network timing evaluation used to detect beacons, works with argus flow as the source☆20May 4, 2016Updated 9 years ago
- Server-side component of the Vault PKI certificate distribution system.☆15Jun 27, 2020Updated 5 years ago
- Thymeleaf samples☆17Nov 1, 2017Updated 8 years ago
- A pure Lua implementation of bk-trees, created because it was needed for fuzzy term matching.☆14Feb 22, 2022Updated 4 years ago
- HECTOR☆20Mar 3, 2017Updated 9 years ago
- pyprefixspan - Python implementation for the algorithm PrefixSpan (Prefix-projected Sequential Pattern mining).☆11Jan 26, 2018Updated 8 years ago
- ☆12May 9, 2022Updated 3 years ago
- System traces dataset generation tool.☆14Mar 18, 2022Updated 4 years ago
- ☆13Mar 16, 2021Updated 5 years ago
- Usenix Security'23☆16Feb 14, 2023Updated 3 years ago
- Using nDPI/openDPI to detect flow protocols from a PCAP file or live NIC. This program was modified from example in nDPI and I added a pe…☆23May 6, 2016Updated 9 years ago
- Large-Scale Sequence Mining with Hierarchies☆13Mar 13, 2015Updated 11 years ago
- Multi-GPU training with TensorFlow on Piz Daint☆12Nov 23, 2021Updated 4 years ago
- Secure SMS: Send and receive encrypted SMS (text) messages between Android phones, to improve privacy.☆29Feb 21, 2011Updated 15 years ago
- Decision trees generated via Graphviz to inform pragmatic threat modelling.☆11Jan 16, 2021Updated 5 years ago
- DNS traffic indexer and analyzer☆26Oct 7, 2014Updated 11 years ago
- GraphChi's C++ version. Big Data - small machine.☆17Nov 29, 2020Updated 5 years ago
- a simple and complete java client to talk to any docker registry☆10Dec 4, 2014Updated 11 years ago
- Talpa Kernel file access interception modules☆17Oct 12, 2022Updated 3 years ago
- [ICSE'24] An Empirical Study of Data Disruption by Ransomware Attacks☆14Mar 1, 2024Updated 2 years ago
- ☆38Nov 20, 2025Updated 4 months ago
- PoC app to test W5100 integration to esp-idf☆13Oct 31, 2025Updated 4 months ago
- Translate STIX 2 Patterning Queries☆31Oct 4, 2018Updated 7 years ago
- ☆16Mar 23, 2018Updated 8 years ago
- Decapsulate traffic encapsulated within GRE, IPIP, 6in4, ESP (ipsec) protocols, can also remove IEEE 802.1Q (virtual lan) header. Works w…☆34Oct 14, 2018Updated 7 years ago
- ☆19Apr 6, 2024Updated last year
- Examples of Docker image build pipelines, including vulnerability scanning with Anchore Engine☆10Mar 6, 2019Updated 7 years ago