Notes about books I've read
☆31Jan 23, 2024Updated 2 years ago
Alternatives and similar repositories for booknotes
Users that are interested in booknotes are comparing it to the libraries listed below
Sorting:
- Overview of different schools of systems thinking☆38Jul 6, 2025Updated 8 months ago
- Bibliography of stuff I've been reading☆13Nov 1, 2020Updated 5 years ago
- Code for "Live Trojan Attacks on Deep Neural Networks" paper☆10May 8, 2020Updated 5 years ago
- ☆12Feb 1, 2020Updated 6 years ago
- DevSecOps command line asset inventory tool☆30Oct 2, 2023Updated 2 years ago
- How Quartz used AI to help reporters search the Mauritius Leaks☆48Aug 13, 2019Updated 6 years ago
- Systems and failure reading list☆203Dec 30, 2021Updated 4 years ago
- Workshops created by the Quartz AI Studio☆48Nov 13, 2020Updated 5 years ago
- Designed and developed an anomaly and misuse based intrusion detection system using neural networks. Technologies used: Java Weka and R.…☆29May 20, 2015Updated 10 years ago
- Decipher all things Philly☆24Jan 11, 2023Updated 3 years ago
- Collection of scripts for The TWINT project☆54Nov 14, 2019Updated 6 years ago
- 🗞 Monitors data sources, alerts you when they change☆13Jul 23, 2021Updated 4 years ago
- transform a datapoint from a website into a CSV time-series dataset using the wayback machine☆12May 24, 2023Updated 2 years ago
- ResiProxy is a ToxiProxy k8s companion☆15Dec 19, 2018Updated 7 years ago
- Audit and test security vulnerabilities or simply wreak chaos upon your ROS system☆11Jul 12, 2018Updated 7 years ago
- Adds an accessible, simplified framework to Harlowe for creating custom macros in JavaScript.☆13Jan 22, 2022Updated 4 years ago
- A collection of 42 students' Core War Champions for AI training purposes☆10Mar 20, 2020Updated 6 years ago
- LLVM Version Manager☆11Apr 21, 2017Updated 8 years ago
- Print out the type encoding for properties in a Swift class☆12May 16, 2015Updated 10 years ago
- Recursive description for UIViewController hierarchy inspection and debugging☆21May 15, 2015Updated 10 years ago
- Perform arp spoofing attack in C☆14Aug 18, 2023Updated 2 years ago
- Example code for neural-network-based anomaly detection of time-series data (uses LSTM)☆180Jun 9, 2017Updated 8 years ago
- A PDF builder to create subjects in PDF format for our bootcamps☆10Jul 21, 2021Updated 4 years ago
- VTable Hijacking Protection for Binaries☆12Feb 28, 2017Updated 9 years ago
- Nexpose Docker Container☆17Jan 28, 2019Updated 7 years ago
- A golang implementation of tf-idf aimed at highest performance on commodity hardware.☆13Jul 8, 2014Updated 11 years ago
- A mirror of the official libtasn1 repository☆16Feb 23, 2023Updated 3 years ago
- Project CRANE (Crisis Racism and Narrative Evaluation) aims to support researchers and anti-racist organisations that wish to use state-o…☆13Nov 16, 2020Updated 5 years ago
- Trojan Attack on Neural Network☆190Mar 25, 2022Updated 3 years ago
- Papers I (+ collaborators) have written or am currently writing☆20Jan 15, 2018Updated 8 years ago
- Web-based Collaborative Common Operating Picture Tool (COP)☆26May 28, 2021Updated 4 years ago
- This small Python 3 project allows to fetch from Twitter API all the tweets you (or even another account) liked, to save them (for backup…☆20Sep 11, 2020Updated 5 years ago
- AWQL parser / lexers☆13Mar 27, 2017Updated 8 years ago
- Add support for debugging JITed code to ORC JIT from LLVM Kaleidoscope example☆13Jun 14, 2017Updated 8 years ago
- Mutation testing for Rust☆13Jun 20, 2016Updated 9 years ago
- AppKit drop-in error handling and reporting mechanism☆20May 10, 2024Updated last year
- Ansible role which installs cron and adds tasks☆18Jan 21, 2022Updated 4 years ago
- Twitter geo intelligence tool. Generates a Leaflet map for a given user or from an existing collection of tweets.☆33May 31, 2019Updated 6 years ago
- Determining weight by measuring the frequency of a sound☆10Feb 17, 2020Updated 6 years ago