This is a proof-of-concept application that utilizes the OpenAI API to embed the secrets of a LLM's knowledge.
☆12Jun 5, 2023Updated 2 years ago
Alternatives and similar repositories for llm-social-engineering-challenge
Users that are interested in llm-social-engineering-challenge are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Identify the type of disease present on a Cassava Leaf image☆12Jul 8, 2021Updated 4 years ago
- Self-host application can generate illustration from a novel by highlighting certain sentences☆13Oct 12, 2025Updated 5 months ago
- Text Query based Traffic Video Event Retrieval with Global-Local Fusion Embedding☆13Aug 2, 2023Updated 2 years ago
- A strong baseline for liveness detection. The source code could be used for similar tasks, such as face anti-spoofing or detecting fake v…☆23Nov 29, 2022Updated 3 years ago
- nncore is a pytorch framework focusing on solving autonomous-driving problems.☆19Nov 2, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Traffic Video Event Retrieval via Text Query using Vehicle Appearance and Motion Attributes☆10Jun 21, 2021Updated 4 years ago
- Zenith training source for Thach Thuc competition that is hosted by HCMUS☆20Jun 16, 2021Updated 4 years ago
- A multi-functional toolkit for social engineering, phishing, email spoofing, SMS/OTP bombing, keylogging, and security audits — built for…☆25Mar 11, 2026Updated 2 weeks ago
- This is sample source code for Reinforcement Learning Competition, hosted by FPT-Software (Hanoi, Vietnam). The game is Gold Miner.☆27Sep 25, 2020Updated 5 years ago
- Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers. It oc…☆16Jan 21, 2023Updated 3 years ago
- General template for my PyTorch projects.☆18Jan 19, 2026Updated 2 months ago
- Social engineering credential harvester☆17Oct 4, 2021Updated 4 years ago
- Social Engineering Definition. Social engineering is a manipulation technique that exploits human error to gain private information, acce…☆22May 26, 2023Updated 2 years ago
- LLMEval☆11Feb 12, 2024Updated 2 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- My personal blog about AI, ML and DL 🎉☆11Aug 23, 2023Updated 2 years ago
- ☆22Nov 4, 2025Updated 4 months ago
- Forked from ggerganov/llama.cpp☆18Mar 22, 2026Updated last week
- data processing code for MIMIC-IV 2.2☆14Jan 26, 2024Updated 2 years ago
- Variable Selection Network with PyTorch☆11May 29, 2024Updated last year
- Repo for uploading notebooks to run LLM model for SQL query generation☆11Sep 25, 2023Updated 2 years ago
- Sentiment analysis with Vietnamese reviews from Shopee online market☆13Nov 21, 2022Updated 3 years ago
- Gathers public information on companies to highlight social engineering risk.☆30May 25, 2016Updated 9 years ago
- Server Fleet Management Challenge - Winner of Huawei Ireland TechArena 2024☆14Sep 23, 2024Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆15Jan 20, 2022Updated 4 years ago
- 🚩👨🎓 Slides for my GitHub Campus Expert workshop.☆15Apr 28, 2018Updated 7 years ago
- implementation for UCB-driven Utility Function Search for Multi-objective Reinforcement Learning based on Decomposition☆14May 28, 2025Updated 10 months ago
- Joint Multilingual Knowledge Graph Completion and Alignment (Findings of EMNLP 2022) (Pytorch)☆37Oct 23, 2022Updated 3 years ago
- ☆12Apr 3, 2022Updated 3 years ago
- Implementation of my approach in the Retrieval of Cultural Heritage Objects (RCHO) track of the 3D Shape Retrieval Challenge (SHREC) 2021☆15Mar 4, 2021Updated 5 years ago
- An AI-CyberSecurity Bot that assists security analysts in incident investigations☆40Feb 21, 2025Updated last year
- ☆10Oct 15, 2021Updated 4 years ago
- 1st place solution for Zalo AI 2019 - Vietnamese Wiki Question Answering☆48Dec 11, 2019Updated 6 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Sample end-to-end pipeline over MIMIC-IV demonstrating the Event Stream GPT code base.☆17Jan 3, 2024Updated 2 years ago
- Data-Driven Software Vulnerability Discovery (SVD)☆13May 27, 2020Updated 5 years ago
- A word embedding and graph-based keyword extraction tool☆19Oct 20, 2025Updated 5 months ago
- A 2D RPG Shooter game, made with Unity☆12Nov 23, 2021Updated 4 years ago
- Renamed training source for "Thach Thuc" Academic Contest☆24Mar 23, 2024Updated 2 years ago
- Social Engineering Tactics contains real-world social engineering tactics used for manipulation, persuasion, and deception. Stay aware an…☆46Jan 25, 2026Updated 2 months ago
- CVPR2021:Self-generated Defocus Blur Detection via Dual Adversarial Discriminators☆24May 24, 2022Updated 3 years ago