☆15Jun 30, 2025Updated 8 months ago
Alternatives and similar repositories for junhosetting
Users that are interested in junhosetting are comparing it to the libraries listed below
Sorting:
- Tensorflow implementation of Relation Network (bAbI dataset)☆32May 1, 2019Updated 6 years ago
- Source code for CVPR 2020 paper "Learning to Forget for Meta-Learning"☆36Oct 26, 2020Updated 5 years ago
- EventPointNet: Robust keypoint detector with neuromorphic camera data☆11Sep 14, 2021Updated 4 years ago
- Official PyTorch Implementation of SinGRAF (CVPR2023)☆11Jun 28, 2023Updated 2 years ago
- SAPProx is a proof of concept tool for intercepting and modifying SAP GUI (DIAG protocol) traffic.☆13Apr 20, 2017Updated 8 years ago
- The official implementation of paper "Drop-Activation: Implicit Parameter Reduction and Harmonious Regularization".☆10May 30, 2019Updated 6 years ago
- sniff inputs type☆10Aug 3, 2017Updated 8 years ago
- Intrinio Web SDK for Real-Time Stock, Forex, and Crypto Prices☆11Dec 2, 2022Updated 3 years ago
- ☆10Jan 20, 2020Updated 6 years ago
- Utility to find addresses of different data structures in ASUS BIOS image files and to store them in INI-formated file☆14Jun 9, 2013Updated 12 years ago
- HPC Examples and Documentation for Julia☆13Feb 7, 2023Updated 3 years ago
- Metasploit Logos that use Z for the new zArch additions☆10Feb 9, 2016Updated 10 years ago
- LLM Chatbot with Retrieval Augmented Generation using Llamaindex. It works both in online and offline mode.☆13Dec 8, 2023Updated 2 years ago
- A platform for hackers to show off their creations.☆14Jul 9, 2018Updated 7 years ago
- A BGEN file format reader.☆11Jan 7, 2025Updated last year
- A simple example of how to solve Kaggle's "Titanic: Machine Learning from Disaster" challenge using Python and scikit-learn☆12May 21, 2014Updated 11 years ago
- Official GitHub Repository for Efficient Off-Policy Safe Reinforcement Learning Using Trust Region Conditional Value At Risk.☆13Nov 24, 2025Updated 3 months ago
- Pytorch implementation of HCNAF: Hyper-Conditioned Neural Autoregressive Flow (CVPR 2020)☆15Jun 14, 2020Updated 5 years ago
- [ICML 2025] Official PyTorch implementation of "NegMerge: Sign-Consensual Weight Merging for Machine Unlearning"☆14Nov 25, 2025Updated 3 months ago
- Estimators for Information Theoretic Functionals using Influence Functions☆11Apr 17, 2016Updated 9 years ago
- A question answering research dataset of movie-related factoids☆10Mar 21, 2016Updated 9 years ago
- Dataset for Image-Goal Navigation in Habitat☆11Feb 24, 2022Updated 4 years ago
- Julia module to handle PLINK BED files☆11Jul 10, 2018Updated 7 years ago
- ☆11Dec 14, 2016Updated 9 years ago
- HTTP Brute Forcer (Java replacement for SP's CrowBar).☆12Apr 20, 2017Updated 8 years ago
- ☆12Nov 24, 2025Updated 3 months ago
- ☆15Apr 10, 2017Updated 8 years ago
- General Discussion☆12May 22, 2019Updated 6 years ago
- ☆33Nov 14, 2025Updated 3 months ago
- A PyTorch baseline defense example for the NIPS 2017 adversarial competition☆10Aug 3, 2017Updated 8 years ago
- Scientific Computing Benchmarks☆11Mar 13, 2020Updated 5 years ago
- Bitclamp allows arbitrary files to be permanently and anonymously published into the Bitcoin and Dogecoin blockchains.☆14Jan 12, 2017Updated 9 years ago
- Do you really know JavaScript ?☆14Oct 31, 2016Updated 9 years ago
- protected is used for creating "protected" connections that bypass Android's VPNService☆11Apr 19, 2024Updated last year
- ☆15Feb 27, 2026Updated last week
- Get version headers from a list of websites☆12Oct 1, 2020Updated 5 years ago
- This repository is about transferring the secure data from one computer to another with the help of socket programming using client-serve…☆12Mar 31, 2022Updated 3 years ago
- ☆11Nov 30, 2025Updated 3 months ago
- Python syntax highlighting script for Vim☆40Jun 15, 2021Updated 4 years ago