Stars
A cross-platform GUI library for Rust, inspired by Elm
Original reference implementation of "3D Gaussian Splatting for Real-Time Radiance Field Rendering"
You would have noticed alot of channel getting popular on YouTube just by uploading “Reddit to Text-To-Speech” YouTube Videos. So I decided to create a program that can automate the process of rece…
Coq is a formal proof management system. It provides a formal language to write mathematical definitions, executable algorithms and theorems together with an environment for semi-interactive develo…
YugabyteDB - the cloud native distributed SQL database for mission-critical applications.
Converts to and from timescales with smeared leap seconds
A simple, double-paranoid encryption library inspired by TripleSec.
A curated list of awesome social engineering resources.
Genome-wide Efficient Mixed Model Association
Shadow is a discrete-event network simulator that directly executes real application code, enabling you to simulate distributed systems with thousands of network-connected processes in realistic an…
a simulation of what competition can look like under cerTain conditions, using things like the BuTTerfly effect.
This is the repository for our paper "INTERS: Unlocking the Power of Large Language Models in Search with Instruction Tuning"
Wish you have a good life of peace…
A utility to safely generate malicious network traffic patterns and evaluate controls.
An automatic generator of basic unit tests for a C/C++ library
A Python package of tools to support population synthesizers
Bot to counter counting-terrorism in the #Counting channel
Cataloging resources related to counter terrorism
[IMC 2020 (Best Paper Finalist)] Using GANs for Sharing Networked Time Series Data: Challenges, Initial Promise, and Open Questions
Automatic SSRF fuzzer and exploitation tool
Code examples from my toptal engineering blog article
Causing deliberate network mayhem for better resilience
Credsleaker allows an attacker to craft a highly convincing credentials prompt using Windows Security, validate it against the DC and in turn leak it via an HTTP request.