Stars
University Domains and Names Data List & API
KoBERT와 CRF로 만든 한국어 개체명인식기 (BERT+CRF based Named Entity Recognition model for Korean)
PyTorch package for the discrete VAE used for DALL·E.
Kalman Filter in Python (파이썬으로 구현하는 칼만 필터)
Pretrained Language Models for Korean
This experimetal fuzzer is meant to be used for API in-memory fuzzing.
A web tool for converting BIP39 mnemonic codes
MTCNN face detection implementation for TensorFlow, as a PIP package.
vulnx 🕷️ an intelligent Bot, Shell can achieve automatic injection, and help researchers detect security vulnerabilities CMS system. It can perform a quick CMS security detection, information colle…
PyTorch implementations of Generative Adversarial Networks.
Some C++ example code to demonstrate how to perform code similarity searches using SimHashing.
Framework for lifting x86, amd64, aarch64, sparc32, and sparc64 program binaries to LLVM bitcode
IDA 2016 plugin contest winner! Symbolic Execution just one-click away!
Implementation of Sequence Generative Adversarial Nets with Policy Gradient in PyTorch
x64dbg / mona
Forked from corelan/monaFork of mona.py with x64dbg support
End-to-end Automatic Speech Recognition for Madarian and English in Tensorflow
PyTorch Tutorial for Deep Learning Researchers
idenLib - Library Function Identification [This project is not maintained anymore]
Like word2vec, except for letters of the alphabet.
Course materials for Modern Binary Exploitation by RPISEC
List of Awesome Red Teaming Resources
Playing with the Tigress software protection. Break some of its protections and solve their reverse engineering challenges. Automatic deobfuscation using symbolic execution, taint analysis and LLVM.
Triton is a dynamic binary analysis library. Build your own program analysis tools, automate your reverse engineering, perform software verification or just emulate code.
The Prime Cross Site Request Forgery (CSRF) Audit and Exploitation Toolkit.
A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on ) for learning Fuzzing and initial phases of Exploit Develo…