Beginner's Guide to building GAN from scratch with Tensorflow and Keras
☆16Mar 25, 2023Updated 3 years ago
Alternatives and similar repositories for GAN-GenerativeAdversarialNetwork
Users that are interested in GAN-GenerativeAdversarialNetwork are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Data-flow Analysis Visualizer☆10Dec 9, 2021Updated 4 years ago
- Run virtual machines in docker using qemu and practice exploitation techniques overcoming containers limitations.☆14Jan 14, 2021Updated 5 years ago
- Continuous functions formalized in Lean4. A students project accompanied by a YouTube video.☆17Jul 10, 2025Updated 8 months ago
- ☆13Dec 2, 2021Updated 4 years ago
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆10Jan 18, 2022Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆30Dec 11, 2025Updated 3 months ago
- Jepsen tests for local filesystems, running on a single node.☆16Aug 15, 2022Updated 3 years ago
- ☆11Mar 16, 2016Updated 10 years ago
- Turn a supported list of filetypes (e.g. .docx) into a markdown structured text file. Also optionally defangs indicators and extract text…☆12Mar 17, 2026Updated last week
- ☆11Dec 17, 2018Updated 7 years ago
- ☆14Dec 10, 2021Updated 4 years ago
- ☆14Jul 8, 2019Updated 6 years ago
- The Tangled Genealogy of IoT Malware☆12Jan 5, 2021Updated 5 years ago
- This tool parses NTDLL.DLL, extracts all the syscall numbers and helps in making direct syscalls, in order to help evasion.☆15Jun 6, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A repository with data about APTs☆13Nov 24, 2022Updated 3 years ago
- A python plugin integrated into Carla Simulator for emulate cyber-attack over the CAN-Bus (https://carla.org/)☆15Apr 26, 2021Updated 4 years ago
- STIX 2 Fake Data Generator☆11Oct 17, 2024Updated last year
- Extract Procedural Details of the TTP based on the actor mentioned in OSINT reportings☆13Feb 25, 2024Updated 2 years ago
- Crackme challenge☆17Nov 20, 2020Updated 5 years ago
- Getting started with Decisions-Disruptions☆11Jan 28, 2020Updated 6 years ago
- DRSource is an extensible, multi-language static analysis tool designed to detect vulnerabilities in source code. It uses a pluggable arc…☆17Mar 5, 2026Updated 3 weeks ago
- ☆15Jun 3, 2023Updated 2 years ago
- Attack/Defense services for the CyberChallenge.IT 2024 National Competition @ Turin, Italy☆11Jul 18, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Source code and data about our large scale study about Java annotaion in practice☆12Apr 14, 2023Updated 2 years ago
- A web API for various cyber threat intelligence frameworks, including MITRE ATT&CK, CWE, ATLAS...☆19Mar 17, 2026Updated last week
- A simple tool to inject shellcode into the remote process with the ability to spoof parent process.☆16Mar 18, 2021Updated 5 years ago
- ProtOSINT is a Python script that helps you investigate Protonmail accounts and ProtonVPN IP addresses☆13Sep 2, 2022Updated 3 years ago
- ☆12Dec 12, 2022Updated 3 years ago
- A Knowledge Graph for Open Source Security Tools☆18Aug 15, 2023Updated 2 years ago
- An open-source software based testing framework for automotive cybersecurity☆12Jul 14, 2023Updated 2 years ago
- This script is to build Wazuh 4.3 environment☆11May 30, 2022Updated 3 years ago
- Site for IWS book content☆17Oct 28, 2018Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Soot-based taint analysis with internal Java fluent interface for security specifications in fluentTQL implemented with MagpieBridge to s…☆18Jan 30, 2025Updated last year
- x86 Assembly Code Examples for Blog Posts☆18Aug 2, 2022Updated 3 years ago
- 🙅♀️📧 Chrome extension that blocks mailto: links from opening automatically!☆12May 10, 2019Updated 6 years ago
- built using https://www.youtube.com/user/CS186Berkeley/playlists☆19Aug 14, 2020Updated 5 years ago
- Additional code and data for the automated malware generation paper☆13May 4, 2024Updated last year
- materials about and for the classes I teach☆16Oct 29, 2021Updated 4 years ago
- A .NET core WebApi template compliant to the SOLID methodology and to the CQRS principle.☆16Dec 8, 2022Updated 3 years ago