Alex 's Projects
Step-by-step debugging and stack navigation in Pry
📖 A collection of pure bash alternatives to external processes.
Improved version This program has potentially unwanted behavior.
Improved versionThis program has potentially unwanted behavior.
利用Python进行数据分析 第二版 (2017) 中文翻译笔记
Improved version This program has potentially unwanted behavior.
A Powerful Spider(Web Crawler) System in Python.
The pytest framework makes it easy to write small tests, yet scales to support complex functional testing
Python - 100 De novato a maestro
A Python API client used to pull and retrieve data from the US Bureau of Economic Analysis
This is a set of instrument to analyze vulnerabilities with python
This is a client with which we will extract and retrieve data from the US Bureau of Economic Analysis.
financial investment models with python for amzn, alphabet, msft and aapl stocks
3d financial investment models with python for amzn, alphabet, msft and aapl stocks
markdown2: A fast and complete implementation of Markdown in Python
This tool is useful for rapid vulnerability assessment and system hardening or weakening for persistence while testing UNIX-based operating systems.
Tensors and Dynamic neural networks in Python with strong GPU acceleration
Simple chatbot implementation with PyTorch.
Dead-simple BIP32 (HD) wallet creation for BTC, BTG, BCH, LTC, DASH, USDT, QTUM and DOGE
QTPyLib, Pythonic Algorithmic Trading
Portfolio analytics for quants, written in Python
UNIX-like reverse engineering framework and command-line toolset
A simple, yet elegant, HTTP library.
Portfolio Optimization and Quantitative Strategic Asset Allocation in Python
rllab is a framework for developing and evaluating reinforcement learning algorithms, fully compatible with OpenAI Gym.
Config files for my GitHub profile.
A powerful and open-source toolkit for hackers and security automation - 安全行业从业者自研开源扫描器合辑
Web Scraping with Python from Beautiful Soup
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.