Elizabeth's repositories
Mail-Injection
π§ [Research] E-Mail Injection: Vulnerable applications
Android-Malware-Analysis
π° [HaHacking: Notes] Android Malware Analysis
GPN-Hackathon
π’ [Hackathon] Gazprom Neft Hackathon: Solution
ML-Corrupted
π [ML] Classification Problem Solution: Guessing the type of a corrupted file