Starred repositories
retrieve information via O365 and AzureAD with a valid cred
List of papers studying machine learning through the lens of category theory
PhoBERT: Pre-trained language models for Vietnamese (EMNLP-2020 Findings)
BARTpho: Pre-trained Sequence-to-Sequence Models for Vietnamese (INTERSPEECH 2022)
More interactive weak supervision with FlyingSquid
A standalone package to scrape financial data from listed Vietnamese companies via Vietstock
A package to build a database of cryptocurrency prices from Bitfinex, Binance and Bittrex
Hyperdrive is a secure, real time distributed file system
Mastering Bitcoin 3rd Edition - Programming the Open Blockchain
AWS Certified Solutions Architect – Professional (SAP-C02) Notes
Jupyter Notebook cung cấp các kiến thức cơ bản về Học Máy và Học Sâu bằng Python với Scikit-Learn, Keras, và TensorFlow 2.
Exercise notebooks for Machine Learning modules on Microsoft Learn
A curated list of resources for Document Understanding (DU) topic
A Unix-style personal search engine and web crawler for your digital footprint.
Personal notes for SAA-C02 test from: https://learn.cantrill.io
YOLOX is a high-performance anchor-free YOLO, exceeding yolov3~v5 with MegEngine, ONNX, TensorRT, ncnn, and OpenVINO supported. Documentation: https://yolox.readthedocs.io/
MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.
.NET IPv4/IPv6 machine-in-the-middle tool for penetration testers
Read Excel Spreadsheets (XLS/XLSX) using Cobalt Strike's Execute-Assembly
All in one tool for Information Gathering, Vulnerability Scanning and Crawling. A must have tool for all penetration testers
Advisories, proof of concept files and exploits that have been made public by @pedrib.
Http request smuggling vulnerability scanner
Boilerplate code for protecting a form with proof of work. Uses javascript in the browser to generate the hashcash and PHP on the server to generate the puzzle and validate the proof of work.
Indicators of Compromise from Amnesty International's cyber investigations