mytechnotalent / RE-GPTLinks
Drawing inspiration from Andrej Karpathy’s iconic lecture, "Let’s Build GPT: From Scratch, in Code, Spelled Out", this project takes you on an immersive journey into the inner workings of GPT. Step-by-step, we’ll construct a GPT model from the ground up, demystifying its architecture and bringing its mechanics to life through hands-on coding.
☆14Updated 7 months ago
Alternatives and similar repositories for RE-GPT
Users that are interested in RE-GPT are comparing it to the libraries listed below
Sorting:
- A step-by-step walkthrough of the inner workings of a simple neural network. The goal is to demystify the calculations behind neural netw…☆20Updated 4 months ago
- A Reverse Engineering Assistant leveraging Retrieval-Augmented Generation (RAG) and the LLaMA-3.1-8B-Instant Large Language Model (LLM). …☆32Updated 11 months ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆31Updated this week
- This contains notes and slides for my talk on Reverse Engineering Android Malware☆56Updated last year
- Found resources in my malware researching adventure.☆16Updated 2 years ago
- The process involves downloading the latest version and automatically configuring it within the Termux Android application. Subsequently,…☆17Updated 3 months ago
- just for fun☆17Updated 5 months ago
- This contains notes and code for my Troopers23 Beyond Java talk☆27Updated 2 years ago
- Obfuscat is a tool and framework for obfuscation with predictable size and runtime overhead.☆37Updated last year
- VulnServer ROP: An Educational Platform for Exploring Buffer Overflow Vulnerabilities and Return-Oriented Programming Techniques☆16Updated last year
- This contains notes, slides, and code for my Strange Loop talk☆33Updated last year
- SIFA-based attacks on AES☆38Updated 7 months ago
- A FREE comprehensive step-by-step embedded Assembler tutorial covering the basics including coding your own vector table and linker scrip…☆42Updated last year
- Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely☆70Updated 11 months ago
- Rust ADB client - Mirror of https://github.com/cocool97/adb_client☆22Updated last week
- Dalvik bytecode disassembler and graph view☆67Updated last year
- BGraph is a tool designed to generate dependencies graphs from Android.bp soong files.☆16Updated 3 years ago
- Smali reference for reverse engineering Dalvik Bytecode☆38Updated last year
- An intentionally vulnerable Android Application to demonstrate various vulnerabilities that airses in Android Components.☆33Updated 3 months ago
- Simple CVE-2021-20294 poc☆11Updated 2 years ago
- IOCs from zLabs research☆20Updated this week
- BlueStacks privilege escalation through VM backdooring☆21Updated last year
- Rust out-of-tree Linux Kernel Modules (LKMs) experimentation framework☆47Updated 2 years ago
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆63Updated 3 years ago
- 📱 RUNIC tamper detection demo - designed to serve as a parallel for understanding more complex tamper detection and integrity systems su…☆13Updated last year
- Detect code obfuscation through text classification in the detection process.☆45Updated last year
- Updated Android biometric bypass script for Frida (from Kamil Breński, Krzysztof Pranczk and Mateusz Fruba, August 2019). The code resolv…☆37Updated 2 years ago
- An ongoing collection of awesome android security tools, software, libraries, learning tutorials, frameworks, academic and practical reso…☆26Updated 3 years ago
- mapAccountHijack is a tool designed to carry out a MAP Account hijack attack, which exploits the Message Access Profile (MAP) in Bluetoot…☆50Updated 5 months ago
- ☆59Updated last year