Lectures summarized with the help of Grok
☆45Jan 4, 2026Updated 2 months ago
Alternatives and similar repositories for notes
Users that are interested in notes are comparing it to the libraries listed below
Sorting:
- An interactive, TLS-capable HTTP intercepting proxy designed for penetration testers and software developers, including a parser for the …☆22Jul 31, 2025Updated 7 months ago
- Tool to check the CloudTrail configuration and the services where trails are sent, to detect potential attacks to CloudTrail logging.☆13May 25, 2024Updated last year
- ☆10Mar 31, 2016Updated 9 years ago
- Prototype compiler from AWS CloudFormation IaC templates into Logic.☆13Dec 5, 2023Updated 2 years ago
- Insecure web application used to test system security controls☆13Oct 14, 2025Updated 4 months ago
- A greybox fuzzer for continuous integration☆10Dec 15, 2023Updated 2 years ago
- Pollard Rho attack on ECDLP with GMP☆10Sep 6, 2022Updated 3 years ago
- reinforcement learning for optimal debt collection strategy☆11Dec 8, 2019Updated 6 years ago
- Malware dev tricks. Syscalls part 1. Simple C example☆10Jun 8, 2023Updated 2 years ago
- Implementation Code of TextHoaxer☆15Aug 21, 2022Updated 3 years ago
- Open SAMMY codebase☆24Feb 24, 2026Updated last week
- In-depth and hands-on practice for acing the exam.☆15Jun 21, 2024Updated last year
- This repo is for LinkedIn Learning course: Building Modern Projects with React☆13Nov 19, 2024Updated last year
- ☆15Aug 16, 2022Updated 3 years ago
- Hands-on Multi-Cloud for Developers☆13Feb 26, 2019Updated 7 years ago
- PoC code for CVE-2018-9539☆20Nov 11, 2018Updated 7 years ago
- Amazon Web Services (AWS) Microsoft Threat Modeling Tool Template☆16Aug 19, 2021Updated 4 years ago
- Some Ghidra scripts to automate my reverse-engineering tasks☆21Mar 18, 2021Updated 4 years ago
- HotFuzz is a fuzz testing utility that generates random data and sends it to a service's endpoint over HTTP or HTTPS based on a given fuz…☆18Mar 14, 2021Updated 4 years ago
- ☆19Aug 25, 2020Updated 5 years ago
- coreStar is a symbolic execution engine for analysis and verification with separation logic☆25Jul 3, 2017Updated 8 years ago
- ☆19Dec 19, 2019Updated 6 years ago
- ☆18Feb 25, 2024Updated 2 years ago
- Road segmentation with pytorch☆18Mar 31, 2022Updated 3 years ago
- Here, we compare Q(\sigma) learning presented by Sutton and Barto in [1] to Tree-Backup, n-step Expected Sarsa, and n-step Sarsa.☆15Feb 17, 2017Updated 9 years ago
- Accelerating DevSecOps on AWS, published by Packt☆14Jan 30, 2023Updated 3 years ago
- Java bytecode manipulation and analysis framework☆17Feb 7, 2017Updated 9 years ago
- Capture the flag Game☆17Apr 14, 2025Updated 10 months ago
- XSS payload designed to steal LastPass users' credentials☆16Apr 25, 2014Updated 11 years ago
- Colors for Sublime Text that maches Gynvael Coldwind vim colours☆17Jun 2, 2021Updated 4 years ago
- ☆16Mar 26, 2017Updated 8 years ago
- Rapid Assessment of Web Resources☆19Nov 11, 2016Updated 9 years ago
- Model Extraction(Stealing) Attacks and Defenses on Machine Learning Models Literature☆29Sep 25, 2024Updated last year
- bash web server because reasons -- CSAW 2016 Prelims☆18Aug 28, 2016Updated 9 years ago
- ☆19Mar 24, 2017Updated 8 years ago
- ☆32Feb 12, 2026Updated 2 weeks ago
- ☆22Sep 9, 2019Updated 6 years ago
- Gradient descent algorithms for linear and logistic regression☆27May 21, 2017Updated 8 years ago
- ☆31Feb 24, 2014Updated 12 years ago