Bert-Jan Fikse's Projects
Arch Linux Install Script (or alis) installs unattended, automated and customized Arch Linux system.
Windows Calculator: A simple yet powerful calculator that ships with Windows
Multi-layer Recurrent Neural Networks (LSTM, GRU, RNN) for character-level language models in Torch
my conky.conf including Uptime CPU MEM NET DiskIO FileSystemInfo BatteryInfo
easy CRUD operations to rapid prototype a web application
Local development environment toolset based on Docker
Dockerfiles to all docker base images we use at whatwedo
Tensorflow implementation of Human-Level Control through Deep Reinforcement Learning
Ghidra is a software reverse engineering (SRE) framework
A toolkit for developing and comparing reinforcement learning algorithms.
World's fastest and most advanced password recovery utility
Small utilities that are useful in advanced password cracking
ISO 3166-1 country lists merged with their UN Geoscheme regional codes in ready-to-use JSON, XML, CSV data sets
A customisable 3D platform for agent-based AI research
Metasploit custom modules, plugins, resource script and.. awesome metasploit collection
Magenta: Music and Art Generation with Machine Intelligence
A portable device that can spoof/emulate any magnetic stripe, credit card or hotel card "wirelessly", even on standard magstripe (non-NFC/RFID) readers. It can disable Chip&PIN and predict AMEX card numbers with 100% accuracy.
Connect external monitors to your system via Wifi-Display specification also known as Miracast
Moodle - the world's open source learning platform
A Real-time Mario Kart AI using CNNs, Offline Search, and DAGGER
VNC client web application
Build and run Docker containers leveraging NVIDIA GPUs
Open Source Computer Vision Library
The core of the Plone content management system
Pretty, minimal and fast ZSH prompt
Full text search on Doctrine entities without external dependencies
SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sensitive data grep strings, fuzzing payloads, and many more.