UBC Scientific Software Seminar: Practical Data Science
☆18Dec 11, 2017Updated 8 years ago
Alternatives and similar repositories for 2017-Fall
Users that are interested in 2017-Fall are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆13Aug 19, 2015Updated 10 years ago
- Machine Learning Challenge #2 on HackerEarth.☆10Aug 12, 2017Updated 8 years ago
- Tool for creating and upgrading databases using SQL scripts stored in source control☆33Dec 19, 2019Updated 6 years ago
- Machine Learning Hackathon organized by Hackerearth☆13Feb 2, 2016Updated 10 years ago
- Various Malware-Related Utilities☆10Aug 4, 2016Updated 9 years ago
- Slides and Demo Script for SparkRSQL Presentation☆11Mar 17, 2015Updated 11 years ago
- Free_the_Debuggers☆19Feb 7, 2015Updated 11 years ago
- Tools for IDA☆13May 25, 2016Updated 9 years ago
- Code, notes, etc of completed Kaggle competitions☆22Aug 15, 2017Updated 8 years ago
- ☆42Dec 17, 2025Updated 3 months ago
- Lurker monitors an incoming network TCP SYN packet to invalid port number, and will respond a TCP SYN-ACK packet to collect packet payloa…☆12Feb 10, 2018Updated 8 years ago
- Suite of classes for Windows programming☆18Apr 13, 2016Updated 9 years ago
- Libiqxmlrpc is an implementation of the XML-RPC standard in C++.☆14Nov 3, 2022Updated 3 years ago
- Moment-Based Estimation for Hierarchical Models (R Package)☆26Apr 23, 2025Updated 11 months ago
- Text Workshop at the London School of Economics, April 2017☆21Apr 25, 2017Updated 8 years ago
- sync NIST's National Vulnerability Database into a local sqlite3 database☆14Apr 27, 2013Updated 12 years ago
- Machine Learning Competitions☆15Mar 27, 2017Updated 8 years ago
- ☆18Jun 27, 2018Updated 7 years ago
- Packer for PE and ELF, 32 and 64bits.☆22Aug 5, 2013Updated 12 years ago
- Competition repository☆21Oct 8, 2019Updated 6 years ago
- Codes related to Knocktober 2016☆23Oct 25, 2016Updated 9 years ago
- IDA Pro plug-in and tools for displaying 3D graphs of procedures using UbiGraph☆26Jun 8, 2013Updated 12 years ago
- Scanning and identifying XOR encrypted PE files in PE resources☆30Jun 22, 2014Updated 11 years ago
- Maybe you're a guy a bit like me -- who watch a lot of series -- so I guess you already know that downloading the latest episodes of all …☆21Apr 27, 2015Updated 10 years ago
- A script to reverse-engineer anti-virus signatures☆32Mar 20, 2013Updated 13 years ago
- Remind yourself of wise words and images in the new tab page☆14May 13, 2017Updated 8 years ago
- Starting Onyx from R☆16Dec 17, 2025Updated 3 months ago
- Installers that are a PITA to find☆18Jun 9, 2021Updated 4 years ago
- libFM R package☆26Aug 26, 2016Updated 9 years ago
- CVE-Search Management Tools - Tools that might be useful for management purposes☆22Oct 7, 2015Updated 10 years ago
- OSX Security Compliance & Hardening☆47Aug 13, 2015Updated 10 years ago
- ☆33Sep 12, 2019Updated 6 years ago
- A scoreboard for Security CTF events☆37Dec 11, 2012Updated 13 years ago
- DEPRECATED Python package for event based simulation and evaluation of distributed algorithms.☆22Jun 21, 2022Updated 3 years ago
- A content-based recommender system for books using the Project Gutenberg text corpus☆29Feb 20, 2017Updated 9 years ago
- Code used in Kaggle competitions☆23Aug 29, 2017Updated 8 years ago
- This is an example of SSH Man in the Middle (MITM) attack using Mininet and Ettercap☆15Sep 24, 2015Updated 10 years ago
- j0llydmper is a windows service that allows you to dump furtively and automaticaly some contents of USB disks just plugged in your comput…☆39Mar 5, 2012Updated 14 years ago
- Solution for Kaggle Rossmann Store Sales Competition☆30Jul 26, 2016Updated 9 years ago