josephmisiti / ML_for_HackersView external linksLinks
Code accompanying the book "Machine Learning for Hackers"
☆79Dec 30, 2014Updated 11 years ago
Alternatives and similar repositories for ML_for_Hackers
Users that are interested in ML_for_Hackers are comparing it to the libraries listed below
Sorting:
- A curated list of awesome Deep Learning tutorials, projects and communities.☆139Jan 7, 2015Updated 11 years ago
- A collection of various deep learning architectures, models, and tips☆18Mar 4, 2020Updated 5 years ago
- Experimental CPSA -- the Cryptographic Protocol Shapes Analyzer experimental version☆20Sep 24, 2025Updated 4 months ago
- Bypass 4xx HTTP response status codes and more. Based on PycURL.☆17Jun 27, 2022Updated 3 years ago
- SilverWare Examples and Demonstrations☆14Feb 8, 2017Updated 9 years ago
- [BASH] Wardriving tool. Collect all the Wi-Fi wireless networks in a log file (csv format) skipping duplicate.☆18Jun 4, 2011Updated 14 years ago
- Listing of my writeups from HackTheBox, VulnHub, TryHackMe, others...☆19May 26, 2021Updated 4 years ago
- DNN☆22Apr 10, 2018Updated 7 years ago
- A place where I build Dockerfiles used in other projects. Built in CircleCI.☆19Aug 27, 2020Updated 5 years ago
- ☆22Jun 9, 2015Updated 10 years ago
- Companion notebook for Real Python's Data Cleaning Tutorial☆26May 5, 2021Updated 4 years ago
- Pythonic interface to the Internet Storm Center / DShield API.☆28May 23, 2023Updated 2 years ago
- Informações extras referentes ao Treinamento Novo Pentest Profissional - https://desecsecurity.com/novo-pentest-profissional☆15May 13, 2023Updated 2 years ago
- scripts☆10Aug 25, 2023Updated 2 years ago
- ☆29Oct 26, 2015Updated 10 years ago
- Cryptographic Protocol Shapes Analyzer☆37Oct 4, 2022Updated 3 years ago
- Dissemination of harmonization code and data for SDI Health surveys☆10Mar 2, 2019Updated 6 years ago
- A 3-day R course given in University College Cork that encompasses various elements off reproducible research facilitated through RStudio…☆11Jun 17, 2020Updated 5 years ago
- Vision-Language Models Toolbox: Your all-in-one solution for multimodal research and experimentation☆12Feb 16, 2025Updated 11 months ago
- We implement MADDPG in a congestion env, and compare with several control groups to highlight the performance of MADDPG☆10Jul 14, 2021Updated 4 years ago
- Draft and review content for MoJ IT Policy.☆11Sep 2, 2020Updated 5 years ago
- c4mund0n60 is a tool that use output of known tools for generate smart information about a domain☆11Sep 20, 2023Updated 2 years ago
- C Projects☆11May 7, 2020Updated 5 years ago
- This is the website for the Language Technology and Data Analysis Laboratory (LADAL) which is part of the School of Languages and Culture…☆14Jan 29, 2025Updated last year
- Hardware specifications and schematics for the Worldcoin Orb.☆10Jul 18, 2023Updated 2 years ago
- Burp extension to fuzz/brute force GenAI/LLM prompts for potential behvioural and Prompt Injection vulnerabilities.☆13Sep 3, 2025Updated 5 months ago
- USENIX 2023 Artifacts☆11Nov 25, 2022Updated 3 years ago
- Compiling a list of free learning resources in different areas of tech☆13Jul 19, 2023Updated 2 years ago
- R Package for Automated Speech Recognition☆10Aug 10, 2015Updated 10 years ago
- Automated Quantitative Trait Locus Analysis (AutoQTL)☆10Mar 5, 2024Updated last year
- black Ip lists, dorks-collection☆16Feb 1, 2026Updated last week
- ☆10Mar 7, 2023Updated 2 years ago
- Ransomware Detection Test PowerShell Script☆11Sep 22, 2017Updated 8 years ago
- Cipher Suite Checker☆12Mar 22, 2023Updated 2 years ago
- ☆14Jun 22, 2018Updated 7 years ago
- Export Tweets from Twitter into JSON file then publish as a Graph objects in Neo4j DB☆10Dec 7, 2018Updated 7 years ago
- This is where we store all the fantastic open government data we will provide to GovHackNZ and beyond☆11Jul 28, 2017Updated 8 years ago
- Repository for the Oulu University Security Engineering course.☆13Sep 12, 2025Updated 5 months ago
- ☆12Feb 16, 2023Updated 2 years ago