AI fun
☆27Feb 27, 2025Updated last year
Alternatives and similar repositories for tensor-pwn
Users that are interested in tensor-pwn are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- LobotoMl is a set of scripts and tools to assess production deployments of ML services☆10May 16, 2022Updated 3 years ago
- ☆13Jun 15, 2024Updated last year
- A detailed list of potentially dangerous file extensions☆18Jun 18, 2025Updated 10 months ago
- Open KLara Project☆36Feb 12, 2026Updated 2 months ago
- ☆24Sep 12, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A collection of sample code used in some experiments with Sliver C2☆16Mar 28, 2023Updated 3 years ago
- Tools that run inside the guest☆11Jan 2, 2020Updated 6 years ago
- Generative web directory fuzzer,crawling and subdomain checker based on chatgpt☆15May 15, 2024Updated last year
- A small and dirty Python 2 decompiler written in Python.☆13Dec 29, 2013Updated 12 years ago
- ☆12Aug 10, 2024Updated last year
- CVE-2023-50254: PoC Exploit for Deepin-reader RCE that affects unpatched Deepin Linux Desktops. Deepin Linux's default document reader "d…☆16Dec 22, 2023Updated 2 years ago
- exploiting and defending neural networks(神经网络攻防专栏)☆15Mar 2, 2021Updated 5 years ago
- Slides and stuffs of the meetings during the 2018☆13Jan 18, 2022Updated 4 years ago
- ☆79Dec 19, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆22Sep 10, 2024Updated last year
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆11Nov 24, 2023Updated 2 years ago
- API to access the Redis database of a BGP Ranking instance.☆17Dec 11, 2017Updated 8 years ago
- ☆45Dec 12, 2024Updated last year
- ☆16Nov 6, 2015Updated 10 years ago
- ☆30Jan 14, 2026Updated 3 months ago
- Binary Ninja Plugin for Generating Callgraphs☆17Jun 17, 2025Updated 10 months ago
- ☆49Feb 25, 2026Updated 2 months ago
- A framework for finding completeness bugs in optimizing compiler toolchains.☆23Mar 4, 2024Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Privacy, security, ad blocking, and VPN tunneling, end to end, free, in your control, and made easy.☆19Sep 24, 2022Updated 3 years ago
- ☆21Dec 18, 2024Updated last year
- Collection of DBI evasion techniques☆16Jan 25, 2022Updated 4 years ago
- GitHub action to run Threagile, the agile threat modeling toolkit, on a repo's threagile.yaml file☆14May 3, 2024Updated 2 years ago
- CERTITUDE - A python package to classify malicious URLs☆20May 16, 2022Updated 3 years ago
- This repo is dedicated to a powerpoint exploit☆33Dec 11, 2020Updated 5 years ago
- future-proof vulnerability detection benchmark, based on CVEs in open-source repos☆68Updated this week
- Ncurses based hex editor with vi interface (upstream)☆23May 27, 2025Updated 11 months ago
- ☆16Jul 17, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- This is a opensource repo about how to detect android malware using Random Forest Classifier and explain it use linearsvc.☆12Feb 7, 2024Updated 2 years ago
- Utilities for processing Wikipedia and Wikidata dumps in Go. Read-only mirror of https://gitlab.com/tozd/go/mediawiki☆13Mar 8, 2026Updated last month
- The code in this repository which function is to extract the shellcode from the maldoc.☆10Jul 17, 2023Updated 2 years ago
- Utility to craft HTML or SVG smuggled files for Red Team engagements☆248Mar 19, 2024Updated 2 years ago
- HN Security's advisories.☆22Nov 7, 2025Updated 5 months ago
- ☆15Jun 27, 2020Updated 5 years ago
- The purpose of this learning collection is to provide links to get you started on the journey of AI security.☆10Oct 24, 2025Updated 6 months ago