-
http://www.nickhayden.com
- Texas, USA
- http://www.nickbuilds.com
- @CoderciseYT
- @CoderciseYT
Stars
📚 Freely available programming books
Command-line program to download videos from YouTube.com and other video sites
The Big List of Naughty Strings is a list of strings which have a high probability of causing issues when used as user-input data.
Deep Learning papers reading roadmap for anyone who are eager to learn this amazing tech!
A toolkit for developing and comparing reinforcement learning algorithms.
If you live in the terminal, kitty is made for you! Cross-platform, fast, feature-rich, GPU based.
Practical Python Programming (course by @dabeaz)
Universe: a software platform for measuring and training an AI's general intelligence across the world's supply of games, websites and other applications.
Dshell is a network forensic analysis framework.
An absolute beginner's guide to Machine Learning and Image Classification with Neural Networks
Uses some known methods that attempt to minimize tracking in Windows 10
« usbkill » is an anti-forensic kill-switch that waits for a change on your USB ports and then immediately shuts down your computer.
Static site generator for designers. Uses Python and Django templates.
Patch PE, ELF, Mach-O binaries with shellcode new version in development, available only to sponsors
A 👶 buddy to help caregivers track sleep, feedings, diaper changes, tummy time and more to learn about and predict baby's needs without (as much) guess work.
DEPRECATED - MozDef: Mozilla Enterprise Defense Platform
Personalized, user-focused recommendations for employee information security.
Create actionable data from your Vulnerability Scans
some codes and notes about the backdoor listening on TCP-32764 in linksys WAG200G.
Hack Night is an open weekly training session run by the OSIRIS lab.
Python program to steganography files into images using the Least Significant Bit.
RapidPro allows organizations to visually build scalable interactive messaging applications.
A tool for deploying and detecting use of Active Directory honeytokens


