Stars
🏡 Open source home automation that puts local control and privacy first.
The Big List of Naughty Strings is a list of strings which have a high probability of causing issues when used as user-input data.
Deep Learning papers reading roadmap for anyone who are eager to learn this amazing tech!
120+ interactive Python coding interview challenges (algorithms and data structures). Includes Anki flashcards.
Image-to-Image Translation in PyTorch
The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.
A curated list of data science blogs
All of the ad-hoc things you're doing to manage incidents today, done for you, and much more!
IntelOwl: manage your Threat Intelligence at scale
Patch PE, ELF, Mach-O binaries with shellcode new version in development, available only to sponsors
A TensorFlow implementation of the Differentiable Neural Computer.
Bare bone examples of machine learning in TensorFlow
Platform for monitoring the four key software delivery metrics of software delivery
A deliberately vulnerable CI/CD environment. Learn CI/CD security through multiple challenges.
List of resources about programming practices for writing safety-critical software.
Unified Interface for Constructing and Managing Workflows on different workflow engines, such as Argo Workflows, Tekton Pipelines, and Apache Airflow.
An automated subreddit with posts created using markov chains
EuroPi: A reprogrammable Eurorack module based on the Raspberry Pi Pico
A Tool for DNS Delegation Trust Graphing
Analysis of Bitcoin's current and future transaction throughput bottlenecks.
An API for Dungeon Crawl Stone Soup for Artificial Intelligence research.
Solutions for ROP Emporium challenges (https://ropemporium.com/) in python.