saelo / deeplearnLinks
OpenCL deep learning toolkit
☆17Updated 6 months ago
Alternatives and similar repositories for deeplearn
Users that are interested in deeplearn are comparing it to the libraries listed below
Sorting:
- Various cryptographic backdoors and tools to detect them☆21Updated 10 years ago
- Using RNNs for password cracking☆87Updated 4 years ago
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆101Updated 9 years ago
- Spying using Smartwatch and Deep Learning☆188Updated 8 years ago
- Password manager for USB Armory☆37Updated 10 years ago
- Packet Acumen☆19Updated 11 years ago
- A cryptographic method that defends against side-channel attacks☆25Updated 9 years ago
- ☆12Updated 9 years ago
- ☆12Updated 7 years ago
- CDDC Exploitation Framework☆13Updated 2 years ago
- A Tool for Measuring String Similarity☆117Updated 6 years ago
- Detect some forms of linux kernel tampering☆12Updated 10 years ago
- Locates your Wi-Fi-enabled machine using Wi-Fi access points signal strengths, using Google's API☆20Updated 8 years ago
- proof of concept to backdoor files from owncloud encryption module☆17Updated 9 years ago
- Tools for attacking cryptographic implementations.☆21Updated 9 years ago
- Advanced HTTP fingerprinting PoC☆45Updated 8 years ago
- This project contains a PoC and exploit generator for a code execution bug in Ubuntu's Apport crash reporter☆95Updated 8 years ago
- Vulnerable Linux socket game for educational purposes☆22Updated 8 years ago
- Using Ordered Markov Chains and User Information to Speed up Password Cracking☆27Updated 8 years ago
- A OS X crypto ransomware PoC☆88Updated 10 years ago
- Whitelist Tor exit relays to allowing Tor users access your CloudFlare-protected site without CAPTCHA's☆62Updated 9 years ago
- ☆12Updated 8 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆146Updated 10 years ago
- Automated Data Model and State Machine Inference of Previously Unobserved Network Protocols☆14Updated 10 years ago
- lte security☆41Updated 10 years ago
- hid emulation tools for the usbarmory☆68Updated 9 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Updated 9 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆79Updated 10 years ago
- A collection of toy programs for teaching buffer overflow vulnerabilities.☆55Updated 10 years ago
- Transmissions over time based covert channels across a network. Modifies the time intervals between packets to transmit data.☆22Updated 3 years ago