-
正规子群 | Sider.ai
-
00:08
(UTC +01:00) - https://lov2.netlify.app/
- https://ctftime.org/team/365958/
- https://n-wn.github.io/my-stars/
Highlights
Lists (18)
Sort Name ascending (A-Z)
Stars
- All languages
- ASP
- Assembly
- Astro
- AutoHotkey
- Awk
- C
- C#
- C++
- CMake
- CSS
- CoffeeScript
- Cuda
- Cython
- DIGITAL Command Language
- Dart
- Dockerfile
- Emacs Lisp
- Gherkin
- Go
- HCL
- HTML
- Inno Setup
- Java
- JavaScript
- Jinja
- Julia
- Jupyter Notebook
- Kotlin
- LLVM
- Lean
- Logos
- Lua
- MDX
- Makefile
- Markdown
- Meson
- Move
- Nix
- OCaml
- Objective-C
- Objective-C++
- PHP
- Pascal
- PowerShell
- Python
- Roff
- Ruby
- Rust
- SCSS
- Sage
- Shell
- Solidity
- Stylus
- Svelte
- Swift
- TeX
- TypeScript
- Vim Script
- Vue
- YARA
- Zig
21 Lessons, Get Started Building with Generative AI
12 Lessons to Get Started Building AI Agents
A simple screen parsing tool towards pure vision based GUI agent
Anthropic's educational courses
Get started with building Fullstack Agents using Gemini 2.5 and LangGraph
LangGPT: Empowering everyone to become a prompt expert! 🚀 📌 结构化提示词(Structured Prompt)提出者 📌 元提示词(Meta-Prompt)发起者 📌 最流行的提示词落地范式 | Language of GPT The pioneering framework for structured & meta-prompt…
《动手学大模型Dive into LLMs》系列编程实践教程
TensorFlow Tutorials with YouTube Videos
[CCS'24] A dataset consists of 15,140 ChatGPT prompts from Reddit, Discord, websites, and open-source datasets (including 1,405 jailbreak prompts).
“让爷康康”是一款手机 AI 应用程序,可以监测不良坐姿并进行语音提示
零知识证明入门教程。Comprehensive Zero-Knowledge Proofs Tutorial. #zk #WIP
Tutorials for getting started with Pwntools
Interactive ChipWhisperer tutorials using Jupyter notebooks.
(Still exploring) My cryptography journey: A collection of notebooks covering different algorithms and concepts from cryptography
💇🏻♀️ An end-to-end workflow for editing hair attributes on real faces
This is The most comprehensive prompt hacking course available, which record our progress on a prompt engineering and prompt hacking course.
This is a dataset of 5G network traffic for use with machine learning tools to benchmark attack detection capabilities for multiple different models. The dataset contains simulated normal and attac…
Complex multiplication based factorization
Agentic LLM CTF to test prompt injection attacks and preventions
Implementation of cryptographic attacks. Mainly reproduction of recent cryptographic papers.
Codes accompanying the paper "Revisiting the Generalized Birthday Problem and Equihash: Single or K Lists?".
A tookit for Identifying-Ideal-Lattice
Slides or multi-media materials for outreach