mytechnotalent / RE-GPT
Drawing inspiration from Andrej Karpathy’s iconic lecture, "Let’s Build GPT: From Scratch, in Code, Spelled Out", this project takes you on an immersive journey into the inner workings of GPT. Step-by-step, we’ll construct a GPT model from the ground up, demystifying its architecture and bringing its mechanics to life through hands-on coding.
☆14Updated 4 months ago
Alternatives and similar repositories for RE-GPT:
Users that are interested in RE-GPT are comparing it to the libraries listed below
- The book and code repo for the FREE Fundamental C++ book by Kevin Thomas.☆18Updated 2 years ago
- A Reverse Engineering Assistant leveraging Retrieval-Augmented Generation (RAG) and the LLaMA-3.1-8B-Instant Large Language Model (LLM). …☆31Updated 8 months ago
- Found resources in my malware researching adventure.☆16Updated 2 years ago
- ☆20Updated 3 weeks ago
- Corrupted files generator. Random bits flipper.☆24Updated last year
- ARM 32-bit Raspberry Pi Hacking Hello World example in Kali Linux.☆16Updated 3 years ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆29Updated this week
- A series of small ARM 64 bite-size articles to help one better reverse AArch64 ARM 64 Linux binaries.☆21Updated 3 years ago
- Analysis tool for estimating the likelihood that a binary contains compressed or encrypted bytes☆47Updated 4 months ago
- ☆16Updated 2 years ago
- Compiler for the Jack Programming Language☆17Updated 5 months ago
- The process involves downloading the latest version and automatically configuring it within the Termux Android application. Subsequently,…☆15Updated 3 weeks ago
- My attempt to teach others about microprocessors and programming in IA-32 and IA-64 assembly, and to spread the word of how awesome it is…☆29Updated 2 years ago
- An ongoing collection of awesome android security tools, software, libraries, learning tutorials, frameworks, academic and practical reso…☆23Updated 3 years ago
- Plugin for NOPing instructions in IDA☆16Updated 11 months ago
- Dataset of packed ELF samples☆19Updated 2 years ago
- fanny.bmp MALWARE - ONLY FOR ACADEMICAL RESEARCH AND EDUCATIONAL PURPOSES! (incl Metasploit detection Module)☆39Updated last year
- ☆19Updated last year
- A collection of random crackme solutions created using Ghidra SRE (software Reverse Engineering) tool for purpose of research.☆27Updated last week
- A collection of awesome software, libraries, learning tutorials, documents and books, awesome resources and cool stuff about ARM and Wind…☆43Updated last year
- WinREPL is a "read-eval-print loop" shell on Windows that is useful for testing/learning x86 and x64 assembly.☆14Updated 2 years ago
- CTF Challenge for CSAW Finals 2021☆12Updated 3 years ago
- Basics on commands/tools/info on how to do a forensic analysis of a mobile phone☆25Updated 2 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Updated 3 years ago
- Android pin cracker☆11Updated 3 years ago
- Android Malware Samples☆90Updated 4 years ago
- Obfuscat is a tool and framework for obfuscation with predictable size and runtime overhead.☆37Updated last year
- A curated collection of scripts for kernel-related devops☆13Updated last year
- A feed of malware samples curated from threat intelligence sources.☆25Updated last year
- Simple CVE-2021-20294 poc☆11Updated 2 years ago