mytechnotalent / RE-GPTLinks
Drawing inspiration from Andrej Karpathy’s iconic lecture, "Let’s Build GPT: From Scratch, in Code, Spelled Out", this project takes you on an immersive journey into the inner workings of GPT. Step-by-step, we’ll construct a GPT model from the ground up, demystifying its architecture and bringing its mechanics to life through hands-on coding.
☆18Updated 9 months ago
Alternatives and similar repositories for RE-GPT
Users that are interested in RE-GPT are comparing it to the libraries listed below
Sorting:
- The process involves downloading the latest version and automatically configuring it within the Termux Android application. Subsequently,…☆17Updated last month
- This contains notes and slides for my talk on Reverse Engineering Android Malware☆54Updated last year
- My all Programming books available for public to download☆23Updated 4 years ago
- Obfuscat is a tool and framework for obfuscation with predictable size and runtime overhead.☆37Updated last year
- This contains notes, slides, and code for my Strange Loop talk☆29Updated last year
- mapAccountHijack is a tool designed to carry out a MAP Account hijack attack, which exploits the Message Access Profile (MAP) in Bluetoot…☆53Updated 7 months ago
- A FREE comprehensive step-by-step embedded Assembler tutorial covering the basics including coding your own vector table and linker scrip…☆42Updated last year
- Fuzzer for fastboot commands☆21Updated last year
- Found resources in my malware researching adventure.☆16Updated 2 years ago
- A curated collection of scripts for kernel-related devops☆13Updated last year
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆32Updated last week
- Packet crafting, injection and sniffing tool☆69Updated last month
- fanny.bmp cleaned MALWARE - ONLY FOR ACADEMICAL RESEARCH AND EDUCATIONAL PURPOSES! (incl Metasploit detection Module)☆46Updated last month
- 📱 RUNIC tamper detection demo - designed to serve as a parallel for understanding more complex tamper detection and integrity systems su…☆14Updated last year
- Compiler for the Jack Programming Language☆19Updated 10 months ago
- ARM 32-bit Raspberry Pi Hacking Hello World example in Kali Linux.☆16Updated 4 years ago
- This contains notes and code for my Troopers23 Beyond Java talk☆22Updated 2 years ago
- A Reverse Engineering Assistant leveraging Retrieval-Augmented Generation (RAG) and the LLaMA-3.1-8B-Instant Large Language Model (LLM). …☆33Updated last year
- Android Malware Samples☆96Updated 4 years ago
- Assembly code editor☆51Updated 2 months ago
- ☆15Updated 3 years ago
- My talks and papers☆37Updated last week
- BlueStacks privilege escalation through VM backdooring☆21Updated last year
- just for fun☆17Updated 7 months ago
- Collections of Quark Script that detect vulnerabilities in the binaries.☆20Updated this week
- Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely☆72Updated last year
- A tool for generating detailed, locally-processed reports from iOS backups, supporting encrypted and unencrypted data.☆63Updated 10 months ago
- Persistent backdoor for Android devices with unlocked bootloader. Runs as root in unrestricted SELinux context and can hide itself from a…☆71Updated last year
- Security Blogs - A simple aggregator for security news/blog☆23Updated 2 weeks ago
- Smali reference for reverse engineering Dalvik Bytecode☆37Updated 2 years ago