tianxinliao / Transformer-learningView external linksLinks
☆38Mar 1, 2022Updated 3 years ago
Alternatives and similar repositories for Transformer-learning
Users that are interested in Transformer-learning are comparing it to the libraries listed below
Sorting:
- Community Eventing and Scripting examples☆18Aug 11, 2025Updated 6 months ago
- Azure APIs enumeration and abuse☆13Dec 20, 2024Updated last year
- runs sliver command on all hosts, partially based on example in sliver repo☆13Mar 23, 2024Updated last year
- Regex based secret scanner for sccm deployment points sccmcontentlib$ shares. Find secrets automatically and download entire packages for…☆18Aug 13, 2025Updated 6 months ago
- 内存加载FRP☆10Sep 11, 2023Updated 2 years ago
- Loads NTDLL, parses the PE file, extracts "Zw" functions, retrieves their System Service Numbers (SSNs), and prints each function’s name,…☆15Apr 21, 2025Updated 9 months ago
- Attack Active Directory Trusts with a single tool☆14Jan 15, 2025Updated last year
- 腾讯安全沙龙 一 二 三 期PPT集合☆19May 24, 2025Updated 8 months ago
- y4er的ysoserial修改版,加入mysql不出网pipe文件生成☆24Jan 30, 2026Updated 2 weeks ago
- Exploit for CVE-2024-0402 in Gitlab☆15Mar 18, 2025Updated 10 months ago
- Obtain emails using the LinkedIn Graph API☆11Oct 1, 2025Updated 4 months ago
- 一款针对Vcenter的综 合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972/31656以及log4j,提供一键上传webs…☆12Dec 18, 2023Updated 2 years ago
- ☆22Apr 28, 2025Updated 9 months ago
- ☆20Sep 6, 2025Updated 5 months ago
- Extract entire function source code based on giving line number using Javaparser☆20Jul 15, 2025Updated 6 months ago
- POC Framework☆10Jul 16, 2017Updated 8 years ago
- This is a VxLAN PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆28Jul 21, 2025Updated 6 months ago
- Dumping LSASS Evaded Endpoint Security Solutions☆18Feb 15, 2025Updated 11 months ago
- Apache Superset Auth Bypass (CVE-2023-27524)☆11May 9, 2023Updated 2 years ago
- Windows Kernel Security: Memory Integrity Verification with Disk Verification of ntoskrnl.exe☆15Mar 23, 2025Updated 10 months ago
- Build docker container for @MaskRay's pcap-search☆12Oct 19, 2018Updated 7 years ago
- Use Rust to implement some Red Team techniques :)☆13Nov 11, 2024Updated last year
- Certipy in Docker☆13Mar 28, 2024Updated last year
- golang计划任务通用服务☆13Mar 5, 2025Updated 11 months ago
- 漏洞盒子入驻企业列表爬虫☆14Jan 18, 2019Updated 7 years ago
- 通达OA OfficeTask udp 2397 端口远程代码执行RCE检测工 具☆21Jun 13, 2025Updated 8 months ago
- PhantomDelay is a precise delay function that uses the Windows high resolution performance counter to pause your program for a specified …☆19May 8, 2025Updated 9 months ago
- Reliable File Transfer Over Meshtastic Networks☆11Jan 11, 2025Updated last year
- ysoserial for su18☆11Jun 19, 2022Updated 3 years ago
- PoC☆12Apr 7, 2025Updated 10 months ago
- Cloud Exploitation Framework 云环境利用框架,方便安全人员在获得 AK 的后续工作☆10Aug 9, 2023Updated 2 years ago
- Citrix CVE-2023-4966 from assetnote modified for parallel and file handling☆11Oct 25, 2023Updated 2 years ago
- Analyzes AdminSDHolder permissions & compares with default baseline or a previous run, to detect potential backdoor/excessive persistent …☆15Apr 8, 2025Updated 10 months ago
- ☆12May 21, 2025Updated 8 months ago
- DEFCON 33 Workshop - Open Source Malware 101 - Everything you always wanted to know about npm malware (and more)☆15Aug 8, 2025Updated 6 months ago
- CyberShield 2025 Intro to EDR Evasion Class☆17Jun 3, 2025Updated 8 months ago
- ☆22Aug 16, 2025Updated 5 months ago
- Eset-Unload is a C++ tool that interacts with a process's loaded modules to identify and unload the ebehmoni.dll module, typically found …☆12Apr 21, 2025Updated 9 months ago
- 此文件用于配套“卫界安全-阿呆攻防”中所涉及的代码类文档☆11Apr 26, 2025Updated 9 months ago