Project Name | Stars | Downloads | Repos Using This | Packages Using This | Most Recent Commit | Total Releases | Latest Release | Open Issues | License | Language |
---|---|---|---|---|---|---|---|---|---|---|
Computer Science Resources | 2,227 | 7 months ago | 9 | |||||||
A list of resources in different fields of Computer Science | ||||||||||
Hover | 309 | 3 months ago | 24 | January 23, 2023 | 4 | mit | Python | |||
:speedboat: Label data at scale. Fun and precision included. | ||||||||||
Awesome Mlsecops | 86 | 3 months ago | 1 | mit | ||||||
A curated list of MLSecOps tools, articles and other resources on security applied to Machine Learning and MLOps systems. | ||||||||||
Human In The Loop Machine Learning Tool Tornado | 49 | a year ago | 5 | agpl-3.0 | Ruby | |||||
Tornado is a human-in-the-loop machine learning framework that helps you exploit your unlabelled data to train models through a simple and easy to use web interface. | ||||||||||
Contextual | 47 | 4 years ago | 6 | July 25, 2020 | 2 | R | ||||
Contextual Bandits in R - simulation and evaluation of Multi-Armed Bandit Policies | ||||||||||
Wave | 15 | 4 months ago | agpl-3.0 | Python | ||||||
WAveform Vector Exploitation (WAVE): Machine Learning for particle physics detectors. | ||||||||||
Labelled Datasets | 12 | a year ago | mit | |||||||
Web3 threat related labelled datasets for data analysis and machine learning developments. | ||||||||||
Exploits Predict | 11 | 9 months ago | 3 | apache-2.0 | Jupyter Notebook | |||||
Predicting the probability of an exploit being released after a CVE is published (by Machine learning algorithm) | ||||||||||
Linear Region Attack | 8 | 4 years ago | Python | |||||||
A powerful white-box adversarial attack that exploits knowledge about the geometry of neural networks to find minimal adversarial perturbations without doing gradient descent | ||||||||||
Cve Search | 5 | 3 years ago | Jupyter Notebook | |||||||
CVE-Search (name still in alpha), is a Machine Learning tool focused on the detection of exploits or proofs of concept in social networks such as Twitter, Github. It is also capable of doing related searches on Google, Yandex, DuckDuckGo on CVEs and detecting if the content may be a functional exploit, a proof of concept or simply information about the vulnerability. |