Syllabus for Fall 2024 session of CSC413/2516, Neural Networks and Deep Learning
☆15Sep 7, 2024Updated last year
Alternatives and similar repositories for csc413-2516-deep-learning-fall-2024
Users that are interested in csc413-2516-deep-learning-fall-2024 are comparing it to the libraries listed below
Sorting:
- Software Exploitation☆11Sep 22, 2025Updated 5 months ago
- Quantum Insert Backdoor POC☆11May 21, 2017Updated 8 years ago
- a jax benchmark for ad hoc teamwork☆19Updated this week
- Paper editor tool☆10Sep 3, 2023Updated 2 years ago
- Get start with RL, today☆14Sep 9, 2025Updated 6 months ago
- A script that parses PowerView's output for GPO analysis. Integrated into bloodhound to find misconfigurations of URA, SMB signing etc☆15Feb 9, 2020Updated 6 years ago
- ☆20Nov 13, 2025Updated 3 months ago
- Awesome Secure Coding☆18Feb 13, 2026Updated 3 weeks ago
- [Coursera] Data Structures and Algorithms Specialization by "University of California San Diego", "National Research University Higher Sc…☆15Apr 1, 2020Updated 5 years ago
- Learning notes and code from CS 329S: Machine Learning Systems Design series.☆20Jun 23, 2025Updated 8 months ago
- ☆12Feb 1, 2022Updated 4 years ago
- A curated resources on what's happening in multimodal learning. Features recent papers, books, related lectures, and other relevant resou…☆16Apr 28, 2023Updated 2 years ago
- Materials from my talk at ODSC East 2025, May 14 in Boston, MA☆19May 18, 2025Updated 9 months ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆15Aug 16, 2022Updated 3 years ago
- Miscellaneous tools for BloodHound☆19Jan 26, 2022Updated 4 years ago
- Introduction to Machine Learning in R☆23May 7, 2021Updated 4 years ago
- labs_modern_malware_c2 Originally supporting Defcon workshop, will morph into Attack Defend for C2.☆20Aug 13, 2022Updated 3 years ago
- Docker Container to deploy Mitre Caldera Automated Adversary Emulation System☆26Sep 26, 2020Updated 5 years ago
- Exploring Large Language Models for Trajectory Prediction: A Technical Perspective☆27Jun 12, 2024Updated last year
- Collection of our CTF write-ups☆28Aug 7, 2020Updated 5 years ago
- My notes for Stanford's CS229 course☆41May 16, 2023Updated 2 years ago
- Programming assignments and labs from the TensorFlow Advanced Techniques Specialization offered by deeplearning.ai on Coursera.☆29Apr 3, 2023Updated 2 years ago
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆42May 18, 2024Updated last year
- ☆37Apr 1, 2024Updated last year
- OSWE Preparation☆38May 28, 2019Updated 6 years ago
- Learning to Retrieve by Trying - Source code for Grounding by Trying: LLMs with Reinforcement Learning-Enhanced Retrieval☆51Oct 31, 2024Updated last year
- Understanding and analyzing carrier files workshop repo☆51Dec 4, 2019Updated 6 years ago
- Code and Configs for Asynchronous RLHF: Faster and More Efficient RL for Language Models☆68Apr 26, 2025Updated 10 months ago
- Microsoft Graph API post-exploitation toolkit☆95Jul 13, 2024Updated last year
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆112Jan 12, 2024Updated 2 years ago
- Python script for analyis of the "Trust.csv" file generated by Veil PowerView. Provides graph based analysis and output.☆121Aug 18, 2020Updated 5 years ago
- ☆113Jun 19, 2022Updated 3 years ago
- This Repository contains Solutions to the Quizes & Lab Assignments of the Mathematics for Machine Learning Specialization offered by Impe…☆137Sep 23, 2023Updated 2 years ago
- easy-to-use payload hosting☆275Apr 22, 2022Updated 3 years ago
- ☆138Apr 20, 2023Updated 2 years ago
- A prototype malware C2 channel using x509 certificates over mTLS☆152Mar 15, 2024Updated last year
- A LLM explicitly designed for getting hacked☆166Aug 2, 2023Updated 2 years ago
- linikatz is a tool to attack AD on UNIX☆155Oct 19, 2023Updated 2 years ago
- ☆165Jul 22, 2024Updated last year