- Ankara, Turkey
- https://www.linkedin.com/in/regaipkurt/
- @kodyazanbirsair
Lists (6)
Sort Name ascending (A-Z)
Stars
An opinionated list of Python frameworks, libraries, tools, and resources.
All Algorithms implemented in Python
🤗 Transformers: the model-definition framework for state-of-the-art machine learning models in text, vision, audio, and multimodal models, for both inference and training.
Linux, Jenkins, AWS, SRE, Prometheus, Docker, Python, Ansible, Git, Kubernetes, Terraform, OpenStack, SQL, NoSQL, Azure, GCP, DNS, Elastic, Network, Virtualization. DevOps Interview Questions
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
1 min voice data can also be used to train a good TTS model! (few shot voice cloning)
Framework for orchestrating role-playing, autonomous AI agents. By fostering collaborative intelligence, CrewAI empowers agents to work together seamlessly, tackling complex tasks.
Ray is an AI compute engine. Ray consists of a core distributed runtime and a set of AI Libraries for accelerating ML workloads.
🥧 HTTPie CLI — modern, user-friendly command-line HTTP client for the API era. JSON support, colors, sessions, downloads, plugins & more.
Best DDoS Attack Script Python3, (Cyber / DDos) Attack With 56 Methods
Impacket is a collection of Python classes for working with network protocols.
A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open and available to the public.
MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.
An advanced memory forensics framework
[CVPR 2020] 3D Photography using Context-aware Layered Depth Inpainting
RSA attack tool (mainly for ctf) - retrieve private key from weak public key and/or uncipher data
🐍 A toolkit for testing, tweaking and cracking JSON Web Tokens
PEDA - Python Exploit Development Assistance for GDB
Scanning APK file for URIs, endpoints & secrets.
EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.
"Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.
The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.