This is a proof-of-concept application that utilizes the OpenAI API to embed the secrets of a LLM's knowledge.
☆12Jun 5, 2023Updated 2 years ago
Alternatives and similar repositories for llm-social-engineering-challenge
Users that are interested in llm-social-engineering-challenge are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Identify the type of disease present on a Cassava Leaf image☆12Jul 8, 2021Updated 4 years ago
- Self-host application can generate illustration from a novel by highlighting certain sentences☆13Oct 12, 2025Updated 6 months ago
- Text Query based Traffic Video Event Retrieval with Global-Local Fusion Embedding☆13Aug 2, 2023Updated 2 years ago
- A strong baseline for liveness detection. The source code could be used for similar tasks, such as face anti-spoofing or detecting fake v…☆23Nov 29, 2022Updated 3 years ago
- nncore is a pytorch framework focusing on solving autonomous-driving problems.☆19Nov 2, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Traffic Video Event Retrieval via Text Query using Vehicle Appearance and Motion Attributes☆10Jun 21, 2021Updated 4 years ago
- Zenith training source for Thach Thuc competition that is hosted by HCMUS☆20Jun 16, 2021Updated 4 years ago
- A multi-functional toolkit for social engineering, phishing, email spoofing, SMS/OTP bombing, keylogging, and security audits — built for…☆31Mar 11, 2026Updated last month
- This is sample source code for Reinforcement Learning Competition, hosted by FPT-Software (Hanoi, Vietnam). The game is Gold Miner.☆27Sep 25, 2020Updated 5 years ago
- Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers. It oc…☆17Jan 21, 2023Updated 3 years ago
- General template for my PyTorch projects.☆18Jan 19, 2026Updated 2 months ago
- Social engineering credential harvester☆17Oct 4, 2021Updated 4 years ago
- Social Engineering Definition. Social engineering is a manipulation technique that exploits human error to gain private information, acce…☆23May 26, 2023Updated 2 years ago
- LLMEval☆11Feb 12, 2024Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- My personal blog about AI, ML and DL 🎉☆11Aug 23, 2023Updated 2 years ago
- ☆22Nov 4, 2025Updated 5 months ago
- data processing code for MIMIC-IV 2.2☆14Jan 26, 2024Updated 2 years ago
- Forked from ggerganov/llama.cpp☆17Updated this week
- Variable Selection Network with PyTorch☆11May 29, 2024Updated last year
- Repo for uploading notebooks to run LLM model for SQL query generation☆11Sep 25, 2023Updated 2 years ago
- Sentiment analysis with Vietnamese reviews from Shopee online market☆13Nov 21, 2022Updated 3 years ago
- Gathers public information on companies to highlight social engineering risk.☆30May 25, 2016Updated 9 years ago
- Server Fleet Management Challenge - Winner of Huawei Ireland TechArena 2024☆14Sep 23, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆15Jan 20, 2022Updated 4 years ago
- 🚩👨🎓 Slides for my GitHub Campus Expert workshop.☆15Apr 28, 2018Updated 7 years ago
- implementation for UCB-driven Utility Function Search for Multi-objective Reinforcement Learning based on Decomposition☆14May 28, 2025Updated 10 months ago
- Joint Multilingual Knowledge Graph Completion and Alignment (Findings of EMNLP 2022) (Pytorch)☆37Oct 23, 2022Updated 3 years ago
- ☆12Apr 3, 2022Updated 4 years ago
- Implementation of my approach in the Retrieval of Cultural Heritage Objects (RCHO) track of the 3D Shape Retrieval Challenge (SHREC) 2021☆15Mar 4, 2021Updated 5 years ago
- An AI-CyberSecurity Bot that assists security analysts in incident investigations☆41Feb 21, 2025Updated last year
- ☆10Oct 15, 2021Updated 4 years ago
- 1st place solution for Zalo AI 2019 - Vietnamese Wiki Question Answering☆48Dec 11, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Sample end-to-end pipeline over MIMIC-IV demonstrating the Event Stream GPT code base.☆17Jan 3, 2024Updated 2 years ago
- Data-Driven Software Vulnerability Discovery (SVD)☆13May 27, 2020Updated 5 years ago
- A word embedding and graph-based keyword extraction tool☆19Oct 20, 2025Updated 5 months ago
- A 2D RPG Shooter game, made with Unity☆12Nov 23, 2021Updated 4 years ago
- Social Engineering Tactics contains real-world social engineering tactics used for manipulation, persuasion, and deception. Stay aware an…☆46Jan 25, 2026Updated 2 months ago
- Renamed training source for "Thach Thuc" Academic Contest☆24Mar 23, 2024Updated 2 years ago
- CVPR2021:Self-generated Defocus Blur Detection via Dual Adversarial Discriminators☆24May 24, 2022Updated 3 years ago