Highlights
- Pro
Lists (32)
Sort Name ascending (A-Z)
Active Directory and Kerberos
Tools and scriptsAI BlockChain
This will be the start of my "model"🦍APIs
Apple Core ML
Code and data🛠️🧰Black Hat 🧰 🛠️
Bose-Einstein Condensates
Quantum Mechanics🙃ChatGPT
Be responsibleComputer Science
🔑Cryptography 🔑
📛Cybersecurity 📛
Pestos son peligrosos Susan ML para atacar otros sistemas📚Datasets 📲
Ethical Artificial Intelligence
AI and MLGPT-3
iPhone
Different Uses with C and SwiftiPhone, iPad, MacOS
💥Isolation Tool
Used for safety!Language Support
🤖🦾🦿Machine Learning
Malware dataset
Math Videos by 3bluef1Brown
Mathematics Calculus
This going to have Calculus and only Calculus🎶 Music
🚀 My stack
⚡️⚡️Optimization
Optimization code and methodsQuantum Computing and Artificial Intelligence
Learning about the Advantages and Benefits of the responsible and ethical application of this Synergy in the near future.🤖Robotics
📛Security
Sysinternals for Linux
Systernal for Linux
⚡️Tasks⚡️
Sentiment Analysis, Questions and Answers,⚒️Tool LLM
YouTube
Starred repositories
Notebooks for "Python for Signal Processing" book
Objective-C Client for the SignalR Project works with iOS and Mac
Server supporting the Signal Private Messenger applications on Android, Desktop, and iOS
A private messenger for Windows, macOS, and Linux.
A private messenger for Android.
A FPGA friendly 32 bit RISC-V CPU implementation
The CORE-V CVA6 is a highly configurable, 6-stage RISC-V core for both application and embedded applications. Application class configurations are capable of booting Linux.
Automagically reverse-engineer REST APIs via capturing traffic
linWinPwn is a bash script that streamlines the use of a number of Active Directory tools
💥 A collection of all documents leaked by former NSA contractor and whistleblower Edward Snowden.
(⌐■_■) - Deep Reinforcement Learning instrumenting bettercap for WiFi pwning.
Open source security data lake for threat hunting, detection & response, and cybersecurity analytics at petabyte scale on AWS
Practical Threat Detection Engineering, Published by Packt
Sublime rules for email attack detection, prevention, and threat hunting.
Iterate.ai has open-sourced a powerful Weapons Detection AI software. The AI was trained on about 100 live guns, plus 20,000 videos of robberies and threats involving weapons. Our engineers taught …
Awesome CSIRT is an curated list of links and resources in security and CSIRT daily activities.
How to systematically secure anything: a repository about security engineering
Seronsecurity / Elemental
Forked from Elemental-attack/ElementalElemental - An ATT&CK Threat Library
Obfuscator for .NET and Mono, with a customizable engine for building your own obfuscators.
CrackQL is a GraphQL password brute-force and fuzzing utility.
A curated list of awesome threat detection and hunting resources