171 skills found · Page 1 of 6
simplenlg / SimplenlgJava API for Natural Language Generation. Originally developed by Ehud Reiter at the University of Aberdeen’s Department of Computing Science and co-founder of Arria NLG. This git repo is the official SimpleNLG version.
priyankgada / The Complete Practical Certified Ethical Hacking Course In EnglishWelcome this comprehensive course on Ethical Hacking! This course assumes you have NO prior knowledge in hacking and by the end of it you'll be able to hack systems like black-hat hackers and secure them like security experts! This course is highly practical but it won't neglect the theory, so we'll start with ethical hacking basics and the different fields in penetration testing, installing the needed software (works on Windows, Linux and Mac OS X) and then we'll dive and start hacking systems straight away. From here onwards you'll learn everything by example, by analysing and exploiting computer systems such as networks, servers, clients, websites .....etc, so we'll never have any boring dry theoretical lectures. The course is divided into a number of sections, each section covers a penetration testing / hacking field, in each of these sections you'll first learn how the target system works, the weaknesses of this system, and how to practically exploit theses weaknesses and hack into it, not only that but you'll also learn how to secure this system from the discussed attacks. This course will take you from a beginner to a more advanced level by the time you finish, you will have knowledge about most penetration testing fields. The course is divided into four main sections: 1. Network Hacking - This section will teach you how to test the security of networks, both wired and wireless. First, you will learn some basic network terminology, how networks work, and how devices communicate with each other. Then it will branch into three sub sections: Pre-connection attacks: in this subsection you'll learn what can you do before even connecting to a network, and even before having internet access; you'll start by learning how to gather information about the networks around you, discover the devices connected to them, and how to control connections around you (ie: deny/allow devices from connecting to networks) even without knowing the password of the target network. Gaining Access: Now that you gathered information about the networks around you, in this subsection you will learn how to crack the key and get the password to your target network weather it uses WEP, WPA or even WPA2. Post Connection attacks: Now that you have the key, you can connect to the target network, in this subsection you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and much more! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients. 2. Gaining Access - In this section you will learn two main approaches to gain full control or hack computer systems: Server Side Attacks: In this subsection you will learn how to gain full access to computer systems without the need for user interaction. You will learn how to gather useful information about a target computer system such as its operating system, open ports, installed services, then you'll learn how to use this information to discover weaknesses and vulnerabilitiesand exploit them to gain full control over the target. Finally you will learn how to generate different types of reports for your discoveries. Client Side Attacks - If the target system does not contain any weaknesses then the only way to gain access to it is by interacting with the users, in this subsection you'll learn how to get the target user to install a backdoor on their system without even realising, this is done by hijacking updatesor backdoornig downloadeds on the fly. Not only that but you'll also learn how to create trojans by backdooring normal files (such as an image or a pdf) and use social engineering to deliver this trojan to the target, to do this you'll learn how to spoof emails so they appear as if they're sent from the target's friend, boss or any email account they're likely to interact with. 3. Post Exploitation - In this section you will learn how to interact with the systems you compromised so far. You’ll learn how to access the file system (read/write/upload/execute), maintain your access, spy on the target and even use the target computer as a pivot to hack other computer systems. 4. Website / Web Application Hacking - In this section you will learn how websites work, how to gather information about a target website (such as website owner, server location, used technologies ....etc) and how to discover and exploit the following dangerous vulnerabilities to hack into websites:
Moado / The Data Scientist S ToolboxIn this period of COVID-19, I unlock access to my personal library of Data Science resources to anyone who is in the process of carrying out an academic project, whether at the end of their studies or those doing research. Furthermore it's also designed to help any aspirant data scientist, wishing to make a breakthrough in this field. This Repository will be updated each week with new resources. Enjoy Learning Data Science and Spread the Word ! En cette période de COVID-19, je déverrouille l'accès à ma bibliothèque personnelle de ressources en sciences des données à toute personne qui est en train de réaliser un projet universitaire, que ce soit à la fin de ses études ou pour ceux qui font de la recherche. En outre, elle est également conçue pour aider tout aspirant chercheur en sciences des données, qui souhaite faire une percée dans ce domaine. Ce répertoire sera mis à jour chaque semaine avec de nouvelles ressources. Profitez de l'apprentissage de la science des données et faites passer le mot !
DISIC / Guide IntegrateurUn guide destiné aux intégrateurs chargés de réaliser des gabarits HTML et CSS accessibles.
semantic-systems / NLIWODCollection of tools, utilities, datasets and approaches towards realising natural language interfaces for the Web of Data.
PhilippeBoisney / OpenClassrooms Parcours AndroidEnsemble de documents & mini-projets réalisés durant la formation diplômante d'un an OpenClassrooms (DÉVELOPPEUR·SE D'APPLICATION - ANDROID)
Azure / AI HubEnterprise Azure OpenAI Hub provides prescriptive architecture and guidance to accelerate Generative AI on Azure for all organisations, in a secure, compliant, scalable, and resillient way, and to democratize proven use-cases to quickly realise business value
lapineige / Blender Add Ons[Eng] Add-ons made in my free time for the 3D software Blender / [Fr] Add-ons pour le logiciel 3D Blender, réalisés durant mon temps libre. Licence: GPL v3
anisayari / Youtube Apprendre Le Deeplearning Avec TensorflowCe repo contient les codes développés dans le cadre de ma série de vidéo sur Youtube pour apprendre à coder en python en utilisant Tensorflow afin de réaliser des tâches de Deep Learning.
In-Network-Machine-Learning / PlanterPlanter is a modular framework for realising in one-click in-network machine learning algorithms.
My-Mujica / LSTM Optuna🚀 This project realises a time sequence prediction framework that can be reproduced, expandible, and directly used for scientific research or engineering experiments🚀
mickaelbaron / Microservices Kubernetes Gettingstarted TutorialL'objectif de cette série d'exercices est d'apprendre à démystifier Kubernetes (K8s) en s'intéressant aux concepts fondamentaux de cet orchestrateur tels que Pod, Deployment, Service et Volume. La mise en place d'un cluster K8s sur son poste de développeur sera expliquée pour réaliser les différentes manipulations
lwjcode / MyblogThis is a personal blog, realise function have publish blog ,review, and update personal message.
gregja / CreativeCodingParisrecensement des présentations réalisées dans le cadre du meetup CreativeCodeParis
Jean-PhilippeDESCAMPS / JPTabViewControllerJPTabViewController est un composant graphique permettant de réaliser sur iOS un Tab Fragment Android.
Mtemi / Crypto Trading Exchange This is a Cryptocurrency Trading Exchange Like Binance, Huobi, Bybit, Bitmex, Bittrex, Phemex etc. That allows you to build your own Centralised Trading Exchange. I have forked it from Jammy928 accessible here: https://github.com/jammy928/CoinExchange_CryptoExchange_Java . I realised Jammy doesn't respond on issues on his repo, and have taken up this mandate to setup the Exchange for anyone who needs it. I can also dpo upgrades as per user requirements, Build iOS and Android Apps of the Exchange, Build Bots like: https://bitsgap.com on top of this for any trading Exchange.
22fevrier2019 / 22fevrier2019Alger, 13 mars 2019 - Lancé aujourd’hui, “www.22fevrier2019.org” est un site internet réalisé par des jeunes algériens. Il a pour but de centraliser les revendications citoyennes et de faire émerger une plateforme légitime et représentative du mouvement de changement que vit l’Algérie. La révolution algérienne en cours, incarne la beauté de l’Algérie. Une Algérie moderne et citoyenne, une Algérie inclusive et unie, une Algérie jeune et libre. “Comment peut on transformer ce mouvement du peuple en un véritable changement sur le terrain”, c’est à cette question récurrente qu’un groupe de jeunes tente de répondre à travers le développement de ce site web. L’objectif de “www.22fevrier2019.org” est de constituer une plateforme de revendication à laquelle pourra participer chaque Algérien. Chaque citoyen peut proposer une revendication, il peut aussi donner un vote positif ou négatif pour les revendications proposées par ces concitoyens. La peur de récupération politique de ce mouvement, rend les algériens méfiants à l’égard des politiques de tous bords, c’est pourquoi la nécessité d’une telle plateforme c’est imposé à nous. Le rôle que joue internet et les réseaux sociaux dans l’expression des revendications du peuple est indéniable. Ce site est un moyen de plus pour les algériens de s’organiser afin de faire aboutir le mouvement.
Xoke / SysAdmin ToolsVarious scripts to help you out. Mostly very scrappy, but functional. I realise Write-Host is not the way to do things, but I wrote some of these before I knew that!
Changgang-Zheng / PlanterPlanter is a modular framework for realising in one-click in-network machine learning algorithms.
jjflash65 / Padauk Pfs154An Arduino based programmer for PFS154. Programmer is realised with external switching regulator and OP-Amp LM358 (like Easy-PDK-Programmer). For now, the progammer can only flash the PFS154. I'm analyzing programming sequence for PFS173 but for the moment I have no idea to realise it. Perhaps in the future. A complete toolchain is include so you can change to a project directory and execute a "make" and a "make flash". Sorry that all comments are in german language, and sorry that this project works only in Linux (and not in Windows)