mytechnotalent / RE-GPT
Drawing inspiration from Andrej Karpathy’s iconic lecture, "Let’s Build GPT: From Scratch, in Code, Spelled Out", this project takes you on an immersive journey into the inner workings of GPT. Step-by-step, we’ll construct a GPT model from the ground up, demystifying its architecture and bringing its mechanics to life through hands-on coding.
☆13Updated 4 months ago
Alternatives and similar repositories for RE-GPT:
Users that are interested in RE-GPT are comparing it to the libraries listed below
- Android OTA image analysis preprocessing automation tool.☆9Updated 2 years ago
- The book and code repo for the FREE Fundamental C++ book by Kevin Thomas.☆18Updated 2 years ago
- Found resources in my malware researching adventure.☆16Updated 2 years ago
- Corrupted files generator. Random bits flipper.☆23Updated last year
- BurpDroid is a web application debugging tool for Android and is often used for checking web application security. It’s a proxy-based too…☆10Updated 3 years ago
- An ongoing collection of awesome android security tools, software, libraries, learning tutorials, frameworks, academic and practical reso…☆22Updated 3 years ago
- My attempt to teach others about microprocessors and programming in IA-32 and IA-64 assembly, and to spread the word of how awesome it is…☆29Updated 2 years ago
- Obfuscat is a tool and framework for obfuscation with predictable size and runtime overhead.☆37Updated last year
- How long will it take to crack a hash ?☆29Updated 5 years ago
- ☆23Updated 3 years ago
- ☆19Updated last year
- 📱 RUNIC tamper detection demo - designed to serve as a parallel for understanding more complex tamper detection and integrity systems su…☆13Updated 11 months ago
- A tool for generating detailed, locally-processed reports from iOS backups, supporting encrypted and unencrypted data.☆52Updated 5 months ago
- IOCs from zLabs research☆15Updated last month
- This contains notes and slides for my talk on Reverse Engineering Android Malware☆52Updated last year
- BGraph is a tool designed to generate dependencies graphs from Android.bp soong files.☆16Updated 2 years ago
- Run the Medusa Android framework inside a docker container on x86 or ARM☆34Updated 2 years ago
- This contains notes and code for my Troopers23 Beyond Java talk☆26Updated last year
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Updated 3 years ago
- Lazily wraps various Linux system auditing tools☆17Updated last year
- Real Android malware apps discussed in the book☆37Updated last year
- A FREE comprehensive step-by-step embedded Assembler tutorial covering the basics including coding your own vector table and linker scrip…☆39Updated last year
- Scripts to help and speed up reversing activities☆10Updated 3 months ago
- The legend of random website☆16Updated 2 weeks ago
- Powerful advanced web platform for C2 managing and automated penetration testing.☆14Updated last year
- Public repository containing materials for various malware-related streams.☆34Updated 2 months ago
- Frida plugin for Binary Ninja☆17Updated 2 months ago
- ARM 32-bit Raspberry Pi Hacking Hello World example in Kali Linux.☆15Updated 3 years ago
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆60Updated 3 years ago
- A PE parser written in C++ which does not uses OOP. Helpful if you want to learn about PE parsing.☆16Updated last year