multi-cloud-training / Hands-on-Multi-Cloud-for-DevelopersView external linksLinks
Hands-on Multi-Cloud for Developers
☆13Feb 26, 2019Updated 6 years ago
Alternatives and similar repositories for Hands-on-Multi-Cloud-for-Developers
Users that are interested in Hands-on-Multi-Cloud-for-Developers are comparing it to the libraries listed below
Sorting:
- An interactive, TLS-capable HTTP intercepting proxy designed for penetration testers and software developers, including a parser for the …☆21Jul 31, 2025Updated 6 months ago
- Tool to check the CloudTrail configuration and the services where trails are sent, to detect potential attacks to CloudTrail logging.☆13May 25, 2024Updated last year
- A greybox fuzzer for continuous integration☆10Dec 15, 2023Updated 2 years ago
- Insecure web application used to test system security controls☆13Oct 14, 2025Updated 4 months ago
- Pollard Rho attack on ECDLP with GMP☆10Sep 6, 2022Updated 3 years ago
- reinforcement learning for optimal debt collection strategy☆11Dec 8, 2019Updated 6 years ago
- ☆11Jun 7, 2022Updated 3 years ago
- Implementation Code of TextHoaxer☆15Aug 21, 2022Updated 3 years ago
- Open SAMMY codebase☆22Feb 3, 2026Updated last week
- Experimental library for sampling and validating scikit-learn parameters☆10Mar 26, 2019Updated 6 years ago
- This repo is for LinkedIn Learning course: Building Modern Projects with React☆13Nov 19, 2024Updated last year
- In-depth and hands-on practice for acing the exam.☆15Jun 21, 2024Updated last year
- ☆16Sep 12, 2022Updated 3 years ago
- ☆12May 1, 2023Updated 2 years ago
- Neural Deconvolutions in Tensorflow☆12May 18, 2020Updated 5 years ago
- ☆13Sep 10, 2015Updated 10 years ago
- ☆15Aug 16, 2022Updated 3 years ago
- 5th Place Solution to 3rd YouTube-8M Video Understanding Challenge (Last Top GB Model)☆13Oct 23, 2019Updated 6 years ago
- A simple python wrapper for using the Caddy API☆27Feb 3, 2026Updated last week
- Infrastructure for running Kubernetes workshops☆17Mar 25, 2024Updated last year
- A Tiny, Pure Python implementation of Gradient Boosted Trees.☆14Dec 28, 2022Updated 3 years ago
- Amazon Web Services (AWS) Microsoft Threat Modeling Tool Template☆16Aug 19, 2021Updated 4 years ago
- ☆19Aug 25, 2020Updated 5 years ago
- JWT auth checks for Ring☆16Sep 16, 2025Updated 4 months ago
- Some Ghidra scripts to automate my reverse-engineering tasks☆21Mar 18, 2021Updated 4 years ago
- Java bytecode manipulation and analysis framework☆17Feb 7, 2017Updated 9 years ago
- Road segmentation with pytorch☆18Mar 31, 2022Updated 3 years ago
- Here, we compare Q(\sigma) learning presented by Sutton and Barto in [1] to Tree-Backup, n-step Expected Sarsa, and n-step Sarsa.☆15Feb 17, 2017Updated 8 years ago
- An OPA library to develop IT Control policies, for the IBM Cloud☆17Sep 26, 2022Updated 3 years ago
- XSS payload designed to steal LastPass users' credentials☆16Apr 25, 2014Updated 11 years ago
- ☆19Dec 19, 2019Updated 6 years ago
- Capture the flag Game☆17Apr 14, 2025Updated 10 months ago
- Implemenation of UNets for Lung Segmentation☆19May 29, 2018Updated 7 years ago
- Model Extraction(Stealing) Attacks and Defenses on Machine Learning Models Literature☆29Sep 25, 2024Updated last year
- ☆16Mar 26, 2017Updated 8 years ago
- ☆19Mar 30, 2018Updated 7 years ago
- ☆27Feb 3, 2026Updated last week
- ☆19Aug 12, 2021Updated 4 years ago
- ☆19Mar 24, 2017Updated 8 years ago