craffel / csc413-2516-deep-learning-fall-2024View external linksLinks
Syllabus for Fall 2024 session of CSC413/2516, Neural Networks and Deep Learning
☆15Sep 7, 2024Updated last year
Alternatives and similar repositories for csc413-2516-deep-learning-fall-2024
Users that are interested in csc413-2516-deep-learning-fall-2024 are comparing it to the libraries listed below
Sorting:
- Quantum Insert Backdoor POC☆11May 21, 2017Updated 8 years ago
- Get start with RL, today☆14Sep 9, 2025Updated 5 months ago
- A course offered by Stanford University☆14Sep 4, 2020Updated 5 years ago
- A script that parses PowerView's output for GPO analysis. Integrated into bloodhound to find misconfigurations of URA, SMB signing etc☆15Feb 9, 2020Updated 6 years ago
- Awesome Secure Coding☆19Feb 10, 2025Updated last year
- ☆20Nov 13, 2025Updated 3 months ago
- [Coursera] Data Structures and Algorithms Specialization by "University of California San Diego", "National Research University Higher Sc…☆15Apr 1, 2020Updated 5 years ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆15Aug 16, 2022Updated 3 years ago
- A curated resources on what's happening in multimodal learning. Features recent papers, books, related lectures, and other relevant resou…☆16Apr 28, 2023Updated 2 years ago
- Materials from my talk at ODSC East 2025, May 14 in Boston, MA☆19May 18, 2025Updated 8 months ago
- Miscellaneous tools for BloodHound☆19Jan 26, 2022Updated 4 years ago
- Standardized Minecraft Diamond Environment for Reinforcement Learning☆36May 19, 2023Updated 2 years ago
- Programming assignments and labs from the TensorFlow Advanced Techniques Specialization offered by deeplearning.ai on Coursera.☆29Apr 3, 2023Updated 2 years ago
- Public repository of all things cloud security.☆47Sep 20, 2024Updated last year
- Code and Configs for Asynchronous RLHF: Faster and More Efficient RL for Language Models☆68Apr 26, 2025Updated 9 months ago
- Notebooks and notes from going through Deeplearning.AI's linear algebra course☆65Feb 16, 2023Updated 3 years ago
- Data-Scientist-Books (Machine Learning, Deep Learning, Natural Language Processing, Computer Vision, Long Short Term Memory, Generative A…☆128Jul 19, 2025Updated 6 months ago
- Microsoft Graph API post-exploitation toolkit☆95Jul 13, 2024Updated last year
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆113Jan 12, 2024Updated 2 years ago
- Programming assignments and lecture notes of the Deep Learning Specialization taught by Andrew Ng and offered by deeplearning.ai on Cours…☆102Feb 20, 2023Updated 2 years ago
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆118May 2, 2024Updated last year
- Python script for analyis of the "Trust.csv" file generated by Veil PowerView. Provides graph based analysis and output.☆121Aug 18, 2020Updated 5 years ago
- An ssh honeypot with the XZ backdoor. CVE-2024-3094☆145Apr 2, 2024Updated last year
- ☆138Apr 20, 2023Updated 2 years ago
- A prototype malware C2 channel using x509 certificates over mTLS☆152Mar 15, 2024Updated last year
- linikatz is a tool to attack AD on UNIX☆155Oct 19, 2023Updated 2 years ago
- ☆164Jul 22, 2024Updated last year
- A tool collection for filtering and visualizing logon events. Designed to help answering the "Cotton Eye Joe" question (Where did you com…☆180May 27, 2025Updated 8 months ago
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆183Jun 9, 2024Updated last year
- Collection of Linux and macOS Volatility3 Intermediate Symbol Files (ISF), suitable for memory analysis 🔍☆262Jan 20, 2026Updated 3 weeks ago
- SpecterOps Presentations☆211Jan 28, 2026Updated 2 weeks ago
- different ntdll unhooking techniques : unhooking ntdll from disk, from KnownDlls, from suspended process, from remote server (fileless)☆202Aug 2, 2023Updated 2 years ago
- Public script from SANS FOR509 Enterprise Cloud Incident Response☆219Oct 26, 2025Updated 3 months ago
- A collection of all my personal cheat sheets and guides as I progress through my career in offensive security.☆279Oct 8, 2025Updated 4 months ago
- Quick Malicious ClickOnceGenerator for Red Team☆273Jan 27, 2021Updated 5 years ago
- Abusing Reddit API to host the C2 traffic, since most of the blue-team members use Reddit, it might be a great way to make the traffic lo…☆270Jan 18, 2023Updated 3 years ago
- official repo for the AdHuntTool (part of the old RedTeamCSharpScripts repo)☆232Jun 10, 2022Updated 3 years ago
- Beacon Object File (BOF) Creation Helper☆236May 3, 2022Updated 3 years ago
- The source code files that accompany the short book "Building C2 Implants in C++: A Primer" by Steven Patterson (@shogun_lab).☆234Dec 14, 2024Updated last year