Homepage
Open in app
Sign in
Get started
COMPUTER VISION
NLP
ML
End-to-end ML project
TRENDING
ABOUT
AUTHOR RESOURCES
NEWSLETTER
Follow
Hacking websites with PHP Deserialization + LFI + PHP
Hacking websites with PHP Deserialization + LFI + PHP
Using PHP(S) files -> source files instead of PHP to bypass WAF to access source code. From there a deserialization vulnerability can be…
Alimuhammadsecured
Aug 13
What Is Perceptron?
What Is Perceptron?
The Building Block Of Neural Networks
Kevalsakhiya
Aug 12
Leveraging Social Media Data
Leveraging Social Media Data
The goal of every business is to maximize profit with minimal investment. If you’re not utilizing social media data for your business…
Ayomitan Adesua
Aug 11
Persona Hub: The Methodology of Persona-Driven Data Synthesis
Persona Hub: The Methodology of Persona-Driven Data Synthesis
A Look into “Scaling Synthetic Data Creation with 1,000,000,000 Personas” by Chan, Wang, Yu, Mi, and Yu (2024)
Milani Mcgraw
Aug 11
Introducing JSON Schemas for AI Data Integrity
Introducing JSON Schemas for AI Data Integrity
As AI models, particularly large language models (LLMs), become integrated into business critical applications, developers face the…
Stephen Collins
Aug 11
A Practical Introduction to Predictive Analytics
A Practical Introduction to Predictive Analytics
We live in an age where data is often regarded as a gold mine, or ‘the new oil’, businesses are increasingly turning to predictive…
Ayomitan Adesua
Aug 11
RAG Foundry: A Framework for Enhancing LLMs for RAG
RAG Foundry: A Framework for Enhancing LLMs for RAG
In recent years, the field of artificial intelligence has gone through a lot of advancements, particularly in the domain of Large Language…
Keyur Ramoliya
Aug 9
Don’t Be the Baker Who Can’t Smell the Cake
Don’t Be the Baker Who Can’t Smell the Cake
TL;DR: Whether you’re developing a product or selling it, understanding the fundamentals is essential.
Andrei Damian
Aug 9
I cloned my cousin’s drawing style
I cloned my cousin’s drawing style
easy with Dreambooth
Arthur Lagacherie
Aug 9
Panda Power: How Data Science Transforms Creative Writing and Reading
Panda Power: How Data Science Transforms Creative Writing and Reading
Picture this: A panda, not the furry black-and-white kind munching on bamboo, but a data-crunching, code-savvy panda wielding the power of…
Taeja Williams
Aug 7
Small Business, Big Threats? Outsmart Cybercriminals on a Shoestring Budget! Yes you can read on….
Small Business, Big Threats? Outsmart Cybercriminals on a Shoestring Budget! Yes you can read on….
Cybersecurity might seem like a luxury for small businesses, but it’s actually a necessity. Even without a hefty budget or full-blown…
K.A.Malikoo
Aug 7
Are you implementing Zero Trust in your Organization? Because Trusting is “So 2019” 😜
Are you implementing Zero Trust in your Organization? Because Trusting is “So 2019” 😜
Zero Trust: Don’t Trust Anyone, Not Even Yourself
K.A.Malikoo
Aug 7
Zero-shot ECG classification using multimodal learning and test-time CKEPE
Zero-shot ECG classification using multimodal learning and test-time CKEPE
In this article, I’ll explain the paper: Zero-shot ECG classification using multimodal learning and test-time clinical knowledge…
Tayyib Ul Hassan Gondal
Aug 6
Leaking Stack Memory Using C’s Printf formatters
Leaking Stack Memory Using C’s Printf formatters
picoCTF practice I wanted to write a writeup on (for myself mainly) of my thought process and rabbit holes of leaking the flag using NOT…
Alimuhammadsecured
Aug 5
Understanding Vector Databases: What They Are and When to Use Them
Understanding Vector Databases: What They Are and When to Use Them
As artificial intelligence (AI) and machine learning (ML) continue to advance, the need for efficient data storage and retrieval has become…
Asimsultan (Head of AI)
Aug 5
Stop Blaming IT: All your company employees holds the keys to security!
Stop Blaming IT: All your company employees holds the keys to security!
Well! Yes, I said that right! — security is the resposibility of all your employees. Let’s start using an analogy so it will be easier to…
K.A.Malikoo
Aug 5
The Role of the Data Scientist: Bridging AI and Human Understanding
The Role of the Data Scientist: Bridging AI and Human Understanding
TL;DR: Data Scientists balance technical work and education, clarifying AI capabilities and limits; Managing expectations is crucial, as…
Andrei Damian
Aug 5
OSINT — using Whatsmyname.app
OSINT — using Whatsmyname.app
2024 N00bz CTF Pastebin Writeup
Alimuhammadsecured
Aug 4
Arbitrary Python Code Execution hijacking local base64 module
Arbitrary Python Code Execution hijacking local base64 module
2024 N00bz CTF WaaS Writeup
Alimuhammadsecured
Aug 4
Downloading website’s files with an LFI Bypass using symlinks
Downloading website’s files with an LFI Bypass using symlinks
2024 N00bzCTF File Sharing Portal Writeup
Alimuhammadsecured
Aug 4
Nothing Is Beneath You: Embracing Every Challenge as a Data Scientist
Nothing Is Beneath You: Embracing Every Challenge as a Data Scientist
“This is beneath me.” “This task is demeaning.” “I’m overqualified for this.” “This task feels insulting.” “I shouldn’t have to do…
Andrei Damian
Aug 2
Model Collapse in AI
Model Collapse in AI
In recent years, artificial intelligence (AI) has become an integral part of our daily lives, assisting us with tasks ranging from writing…
Keyur Ramoliya
Aug 1
Why TikToken is the Game-Changer in NLP Tokenization
Why TikToken is the Game-Changer in NLP Tokenization
Tokenization is a crucial step in natural language processing (NLP) and text analytics. It involves splitting text into tokens, making it…
Asimsultan (Head of AI)
Jul 30
CLONING any VOICE? Easy,
CLONING any VOICE? Easy,
with tortoise-TTS
Arthur Lagacherie
Jul 29
Designing a purchase propensity model for your website
Designing a purchase propensity model for your website
There are more than 5.44 billion internet users worldwide as of April 2024, amounting to 67.1% of the global population as per Statista…
Abhranil Pal
Jul 29
About The Deep Hub
Latest Stories
Archive
About Medium
Terms
Privacy
Teams