gabmerlo / Construyamos-GPTLinks
Guía práctica para construir y entrenar un GPT en español, en concreto una implementación de nano-GPT. Lo entrenamos en obra en verso de Cervantes y junto con mi vídeo en youtube cubre todos los componentes necesarios.
☆15Updated 3 months ago
Alternatives and similar repositories for Construyamos-GPT
Users that are interested in Construyamos-GPT are comparing it to the libraries listed below
Sorting:
- Simple ECIES, ECDSA and AES library for Python, supporting OpenSSL and pure-Python environments☆26Updated 5 years ago
- A permissively licensed, low-level, high-performance cryptographic hash library for hackers.☆27Updated 6 months ago
- ☆12Updated 5 years ago
- advanced code generator for John the Ripper☆13Updated 7 years ago
- Hulk is able to bruteforce missing bytes after a DCA attack on AES with his special ability of AES-NI☆23Updated 7 years ago
- Bitcoin's public activity data.☆20Updated 6 years ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆21Updated 4 years ago
- Off-chain secure communication protocol with Zero-knowledge proof (Ring Signature) and metadata protection.☆24Updated last year
- Network Traffic Fuzzer☆17Updated 11 months ago
- Pure Python 2 and Python 3 implementations of the ChaCha20 stream cipher☆21Updated 5 years ago
- Worldline Yomani XR Flash Unpacker https://stefan-gloor.ch/yomani-hack☆46Updated last year
- Geolocate your files!☆16Updated 3 years ago
- Bitcoin Hardware Wallet Interaction scripts☆11Updated 2 months ago
- Repository of now harmless TREZOR security exploits☆11Updated 10 years ago
- A tool for linear and differential cryptanalysis of block ciphers written in Rust☆15Updated 3 years ago
- Introduction to Encryption☆12Updated 4 months ago
- Cryptanalysis and attack library☆22Updated 3 years ago
- ☆13Updated 2 years ago
- Diameter TCP to SCTP proxy☆13Updated 13 years ago
- Encrypt and Decrypt message using Ethereum keys.☆12Updated 5 years ago
- Results of a recent FOIA for NIST documents related to the design of Dual EC DRBG. Via EFF and Rep. Grayson's office. See README for deta…☆24Updated 10 years ago
- ☆16Updated 5 years ago
- torrent -> http plumbing☆24Updated 5 years ago
- Minimal setup to trigger the xz backdoor☆29Updated last year
- GPU code for the first SHA-1 collision attack and two freestart attacks☆14Updated 5 years ago
- Library Secruity dependency Checker☆12Updated 6 years ago
- ☆24Updated 3 years ago
- Fastgcd is a C implementation of an efficient algorithm to compute the pairwise GCDs of a collection of integers. The algorithm is due to…☆17Updated last year
- IP over Fibre Channel support for Qlogic HBAs☆18Updated 8 years ago
- An implementation of the concepts behind the Logjam attack☆16Updated 9 years ago