TseTien's Stars
L1aoXingyu/pytorch-beginner
pytorch tutorial for beginners
jinhualee/datashine
《Python统计与数据分析实战》课程代码,包含了大部分统计与非参数统计和数据分析的模型、算法。回归分析、方差分析、点估计、假设检验、主成分分析、因子分析、聚类分析、判别分析、对数线性模型、分位回归模型以及列联表分析、非参数平滑、非参数密度估计等各种非参数统计方法。
MrWQ/vulnerability-paper
收集的文章 https://mrwq.github.io/tools/paper/
x1angli/research-everything
A curated online materials for learning science, technology, arts, languages, etc.
BullsEye0/google_dork_list
Google Dorks | Google helps you to find Vulnerable Websites that Indexed in Google Search Results. Here is the latest collection of Google Dorks. A collection of 13.760 Dorks. Author: Jolanda de Koff
gmelodie/awesome-wordlists
A curated list wordlists for bruteforcing and fuzzing
veeral-patel/how-to-secure-anything
How to systematically secure anything: a repository about security engineering
Z4nzu/hackingtool
ALL IN ONE Hacking Tool For Hackers
mitre/cti
Cyber Threat Intelligence Repository expressed in STIX 2.0
byt3bl33d3r/CrackMapExec
A swiss army knife for pentesting networks
sea-boat/MachineLearning_Lab
Code lab for machine learning. Including Least Square Method,Gradient Descent,Newton's Method,Hierarchy Cluster,KNN,Markov,Adaboost,Random Number Generation(all kinds of distributions),N Sigma outlier detection,outlier detection based on median,FFT outlier detection,DBSCAN,Kmeans,Naive Bayes,perceptron,reinforcement learning.
curiousily/Deep-Learning-For-Hackers
Machine Learning tutorials with TensorFlow 2 and Keras in Python (Jupyter notebooks included) - (LSTMs, Hyperameter tuning, Data preprocessing, Bias-variance tradeoff, Anomaly Detection, Autoencoders, Time Series Forecasting, Object Detection, Sentiment Analysis, Intent Recognition with BERT)
czy36mengfei/tensorflow2_tutorials_chinese
tensorflow2中文教程,持续更新(当前版本:tensorflow2.0),tag: tensorflow 2.0 tutorials
carpedm20/DCGAN-tensorflow
A tensorflow implementation of "Deep Convolutional Generative Adversarial Networks"
dragen1860/Deep-Learning-with-TensorFlow-book
深度学习入门开源书,基于TensorFlow 2.0案例实战。Open source Deep Learning book, based on TensorFlow 2.0 framework.
chen0040/keras-anomaly-detection
Anomaly detection implemented in Keras
buhuixiezuowendelihua/Anomaly-Detection
异常值检测算法总结
volatilityfoundation/volatility
An advanced memory forensics framework
Yara-Rules/rules
Repository of yara rules
rshipp/awesome-malware-analysis
Defund the Police.
esrrhs/pingtunnel
Pingtunnel is a tool that send TCP/UDP traffic over ICMP
HiwinCN/HTran
HTran is a connection bouncer, a kind of proxy server. A “listener” program is hacked stealthily onto an unsuspecting host anywhere on the Internet. When it receives signals from the actual target system, it redirects it to the hacker’s server.
PowerShellMafia/PowerSploit
PowerSploit - A PowerShell Post-Exploitation Framework
maaaaz/impacket-examples-windows
The great impacket example scripts compiled for Windows
stascorp/rdpwrap
RDP Wrapper Library
jgraph/drawio-desktop
Official electron build of draw.io
sxei/chrome-plugin-demo
《Chrome插件开发全攻略》配套完整Demo,欢迎clone体验
maowankuiDji/Word2Vec-sentiment
基于Word2Vec+SVM对电商的评论数据进行情感分析
shunliz/Machine-Learning
机器学习原理
lawlite19/MachineLearning_Python
机器学习算法python实现