saelo / deeplearnLinks
OpenCL deep learning toolkit
☆17Updated 7 months ago
Alternatives and similar repositories for deeplearn
Users that are interested in deeplearn are comparing it to the libraries listed below
Sorting:
- Various cryptographic backdoors and tools to detect them☆21Updated 10 years ago
- Integrity checking script for Apple Thunderbolt to Ethernet adapters, to check for attacks similar to Thunderstrike 2☆26Updated 10 years ago
- Using RNNs for password cracking☆87Updated 4 years ago
- Automated Data Model and State Machine Inference of Previously Unobserved Network Protocols☆14Updated 10 years ago
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆101Updated 9 years ago
- 60 artisanal compiler crashes☆39Updated 9 years ago
- proof of concept to backdoor files from owncloud encryption module☆17Updated 9 years ago
- ☆12Updated 8 years ago
- ViNN - an OpenCL accelerated neural networks library☆33Updated 10 years ago
- Running Key Cipher Decoder + other classic cipher decoders. Automatically discovers likely solutions using an NGram language model.☆39Updated 8 years ago
- Spying using Smartwatch and Deep Learning☆188Updated 8 years ago
- small utility to dump kernel memory☆26Updated 11 years ago
- Simulates Attacks of AB16 on Argon2i☆11Updated 9 years ago
- grsecurity is the most advanced Linux kernel hardening patchset. This repository, not affiliated with the upstream project, aggregate mos…☆86Updated 8 years ago
- Recovery of Plaintext iMessage Data Without Breaking Crypto☆107Updated 9 years ago
- ☆12Updated 9 years ago
- Public resources NB shares☆18Updated 9 years ago
- Hohha Dynamic XOR Encryption Algorithm☆55Updated 6 years ago
- Advanced HTTP fingerprinting PoC☆45Updated 8 years ago
- ☆17Updated 10 years ago
- Packet Acumen☆19Updated 11 years ago
- A OS X crypto ransomware PoC☆89Updated 10 years ago
- Mirror of afl-fuzz, a fuzzer with compiler instrumentation. The original source is only distributed over HTTP. SHA256 checksums verified …☆23Updated 10 years ago
- ☆93Updated 7 years ago
- Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS☆119Updated 8 years ago
- CDDC Exploitation Framework☆13Updated 2 years ago
- A Go implementation of the BERserk attack against Mozilla NSS ASN.1 parsing of PKCS#1 RSA signatures with e = 3. Complete of a certificat…☆95Updated 10 years ago
- Transmissions over time based covert channels across a network. Modifies the time intervals between packets to transmit data.☆22Updated 3 years ago
- IRC bot providing assemble / disassemble for various architectures, powered by Capstone / Keystone☆15Updated 2 years ago
- Tools for attacking cryptographic implementations.☆21Updated 9 years ago