Tutorial: Statistical Relational Learning with Google TensorFlow
☆40Mar 8, 2016Updated 9 years ago
Alternatives and similar repositories for tf_rl_tutorial
Users that are interested in tf_rl_tutorial are comparing it to the libraries listed below
Sorting:
- Poison Ivy Appendix/Extras☆18Aug 21, 2013Updated 12 years ago
- Convert RT tickets to JIRA tickets☆17Mar 9, 2015Updated 10 years ago
- Dump and parse embedded certificates from Windows binaries☆11Jan 3, 2012Updated 14 years ago
- Malware analysis and Reverse Engineering Workshops from Invoke RE☆15Jun 30, 2024Updated last year
- A Large-Scale Dataset for Paraphrased Reading Comprehension☆15Jul 16, 2023Updated 2 years ago
- Extract information from MISP via the API☆16Jul 18, 2016Updated 9 years ago
- Set of test cases that can be used to test custom implementations of the SecRules language (ModSecurity rules format).☆17Feb 25, 2025Updated last year
- Automatically exported from code.google.com/p/verify-sigs☆18Sep 2, 2016Updated 9 years ago
- Run a couchbase lite instance with REST interface locally on you Mac or Raspberry Pi☆17Apr 26, 2015Updated 10 years ago
- Builds json representation of PDF malware sample☆53Apr 11, 2011Updated 14 years ago
- Deploy MISP Project software with Vagrant.☆45Jun 15, 2020Updated 5 years ago
- Another MISP module for Python☆18Feb 17, 2020Updated 6 years ago
- PyCommand Scripts for Immunity Debugger☆37Jun 21, 2014Updated 11 years ago
- ASERT shared scripts for reversing☆32Feb 5, 2018Updated 8 years ago
- This repo describe how to generate the ARC-Challenge submission for BERT Baseline☆25Nov 23, 2022Updated 3 years ago
- Deep Learning DTU summer school 2015☆23Apr 15, 2016Updated 9 years ago
- YETI is a TAXII implementation☆47May 10, 2019Updated 6 years ago
- Python Implementation of Weighted Generalized Canonical Correlation Analysis☆33Apr 30, 2018Updated 7 years ago
- ☆34May 4, 2020Updated 5 years ago
- Creating function call graphs based on radare2 framwork, plot fancy graphs and extract behavior indicators☆33Dec 11, 2016Updated 9 years ago
- User Guide present in Trezor Suite☆12Jan 8, 2026Updated last month
- A huge base of icons coins (cryptocurrencies). 1887 icons from 16x16 to 128x28.☆12Apr 17, 2018Updated 7 years ago
- A High-Frequency Market-Making bot for CoinCheck.jp☆10Oct 30, 2017Updated 8 years ago
- C++ wrapper for YARA.☆45Jan 27, 2020Updated 6 years ago
- ☆85Apr 10, 2023Updated 2 years ago
- A colour-coded radar chart to keep track of technologies in use, whether they are being evaluated, adopted or phased out.☆14Jan 6, 2021Updated 5 years ago
- Acala Foundation Grants Program☆10Apr 27, 2021Updated 4 years ago
- Offensive recon with GitHub Actions☆11Aug 25, 2024Updated last year
- Install, uninstall and control remote and local windows services☆13Feb 4, 2013Updated 13 years ago
- 💻 A collection of config files that bring flavor to my digital world☆17Dec 11, 2023Updated 2 years ago
- ☆12Mar 9, 2022Updated 3 years ago
- In this training will be covered about a very basic step for malware analysis. Using several free tools to recognize malware behavior. Si…☆12May 25, 2016Updated 9 years ago
- Data notification service: subscribe to keywords and get notified whenever an open data sources mentions that keyword.☆24Aug 25, 2013Updated 12 years ago
- A malware sandoxed with gdb☆15Jun 27, 2016Updated 9 years ago
- Python based modular control simulation kickass toolbox☆11Sep 30, 2025Updated 5 months ago
- Static Feature Extraction & Selection (used in conjunction with the MASTIFF framework)☆16Oct 19, 2016Updated 9 years ago
- C# SDK for SecureAuth IdP API☆11May 31, 2023Updated 2 years ago
- Malware.lu tools☆63Oct 28, 2013Updated 12 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Sep 18, 2018Updated 7 years ago