Git Product home page Git Product logo

James Watson's Projects

0d1n icon 0d1n

Tool for automating customized attacks against web applications. Fully made in C language with pthreads, it has fast performance.

adversarial-robustness-toolbox icon adversarial-robustness-toolbox

Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and Blue Teams

advisory-database icon advisory-database

Security vulnerability database inclusive of CVEs and GitHub originated security advisories from the world of open source software.

advsteg icon advsteg

Steganography via adversarial training

al-folio icon al-folio

A beautiful, simple, clean, and responsive Jekyll theme for academics

alae icon alae

[CVPR2020] Adversarial Latent Autoencoders

anonlink icon anonlink

Python implementation of anonymous linkage using cryptographic linkage keys

augmax icon augmax

[NeurIPS'21] "AugMax: Adversarial Composition of Random Augmentations for Robust Training" by Haotao Wang, Chaowei Xiao, Jean Kossaifi, Zhiding Yu, Animashree Anandkumar, and Zhangyang Wang.

awesome-hacker-search-engines icon awesome-hacker-search-engines

A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more

awesome-wsl icon awesome-wsl

Awesome list dedicated to Windows Subsystem for Linux

bobthesmuggler icon bobthesmuggler

"Bob the Smuggler": A tool that leverages HTML Smuggling Attack and allows you to create HTML files with embedded 7z/zip archives. The tool would compress your binary (EXE/DLL) into 7z/zip file format, then XOR encrypt the archive and then hides inside PNG/GIF image file format (Image Polyglots).

book icon book

Computer Networks: A Systems Approach -- Textbook

bpaml-sessions icon bpaml-sessions

This is a repository for all the session summaries from the Beginners' Python and Machine Learning held in Brisbane.

breaching icon breaching

Breaching privacy in federated learning scenarios for vision and text

certipy icon certipy

Tool for Active Directory Certificate Services enumeration and abuse

cifar-10 icon cifar-10

Use the famous CIFAR-10 dataset to train a multi-layer neural network to recognize images of cats, dogs, and other things.

codeexplain.nvim icon codeexplain.nvim

A nvim plugin Powered by GPT4ALL for Real-time Code Explanation and Vulnerability Detection (no internet necessary)

cogvideo icon cogvideo

Text-to-video generation. The repo for ICLR2023 paper "CogVideo: Large-scale Pretraining for Text-to-Video Generation via Transformers"

crossvit icon crossvit

Official implementation of CrossViT. https://arxiv.org/abs/2103.14899

cvt icon cvt

This is an official implementation of CvT: Introducing Convolutions to Vision Transformers.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.