A practical guide to deep learning, for unconventional people.
☆12Jan 6, 2018Updated 8 years ago
Alternatives and similar repositories for deeplearningschool
Users that are interested in deeplearningschool are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Android program help you learn English.☆13Mar 18, 2024Updated 2 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆11Oct 29, 2018Updated 7 years ago
- Nmap results are a semigroup☆13Jul 8, 2021Updated 4 years ago
- ☆11Jun 22, 2020Updated 5 years ago
- autoscan - automatic fingerprint of visited networks☆11Nov 2, 2013Updated 12 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Automated Mass Exploiter☆11Apr 14, 2019Updated 6 years ago
- A module for normalising text.☆10Nov 6, 2019Updated 6 years ago
- An OSINT tool to find data leaks on a targeted website☆17Mar 30, 2021Updated 4 years ago
- Vietnamese GPT-J API service deployed with Docker & Helm chart☆10Dec 11, 2022Updated 3 years ago
- Telegram notification for metasploit sessions.☆13Nov 22, 2018Updated 7 years ago
- Portal Tutorial☆11Feb 3, 2018Updated 8 years ago
- a tools to convert audio to a image like http://weavesilk.com/ display☆14Jan 24, 2015Updated 11 years ago
- Plugins for po, html and gz files☆14Dec 26, 2025Updated 3 months ago
- Plugin for markdown-it markdown parser. Adds name attributes to header tags in output.☆13Jul 14, 2017Updated 8 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Tabula Rasa Tic-Tac-Toe☆10Jan 3, 2019Updated 7 years ago
- Metasploit RPC controller application☆11Aug 20, 2018Updated 7 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆14Feb 9, 2015Updated 11 years ago
- A barebone and framework agnostic exhibit pattern implementation☆23Oct 17, 2015Updated 10 years ago
- Native JACK support for Qubes OS (experimental)☆10Jul 22, 2017Updated 8 years ago
- Automatic removal of copyrighted music from audio streams.☆12Jul 29, 2024Updated last year
- Driver Attack Platform for Linux☆18Mar 2, 2023Updated 3 years ago
- ☆11Jul 15, 2024Updated last year
- ☆14Sep 20, 2014Updated 11 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Implementation of OpenAI's 'Grokking: Generalization Beyond Overfitting on Small Algorithmic Datasets' paper.☆42Sep 23, 2023Updated 2 years ago
- In photographic media, faces are often obfuscated to protect the identity of those pictured. This obfuscation process is done by removing…☆12Jan 10, 2019Updated 7 years ago
- LSTM/BOF model to encode Videos. Implementation of our BMVC paper "Story Understanding in Video Advertisements".☆15Oct 30, 2020Updated 5 years ago
- PoC showing how a potentially malicious script could be hidden, encrypted, into invisible unicode characters☆15May 26, 2019Updated 6 years ago
- ☆16Sep 17, 2024Updated last year
- PoC files for the publication 'How Android's UI Security is Undermined by Accessibility'.☆18May 19, 2020Updated 5 years ago
- Code repository for the paper on "Predicting the Performance of Black-Box LLMs through Self-Queries".☆12Jan 9, 2025Updated last year
- An HTML to Markdown converter written in javascript☆17Jun 16, 2013Updated 12 years ago
- [ICLR26] AI-based scaling law discovery☆27Jan 30, 2026Updated last month
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ransomware encrypte all filles,disque C,disque D,Usb ...etc, filles can not be decrypted☆17Nov 18, 2018Updated 7 years ago
- Covert data exfiltration and detection using 802.11 beacon stuffing☆16May 27, 2019Updated 6 years ago
- Communicate undetected in plain sight using zero width obfuscation.☆15Nov 5, 2021Updated 4 years ago
- A .Net Core MVC webshell☆11Sep 8, 2018Updated 7 years ago
- A repository of silly scada and ICS knick knack tools.☆12Nov 7, 2017Updated 8 years ago
- Put an end to curl | bash with this one weird trick☆17Oct 24, 2015Updated 10 years ago
- LKM Rootkit based on Diamorphine☆15Oct 31, 2018Updated 7 years ago