AustinZuniga / DFA-implemented-pythonLinks
Deteministic Finite Automaton Implementation in Python Language
☆10Updated 7 years ago
Alternatives and similar repositories for DFA-implemented-python
Users that are interested in DFA-implemented-python are comparing it to the libraries listed below
Sorting:
- Random notes I want to backup.☆20Updated 3 years ago
- Collection of Assembly Programs in 8086☆18Updated 7 years ago
- Securely wipe the contents of storage device using Python 2 & 3. Project needs to be refactored, and is starving for unit tests. Works, b…☆10Updated 3 months ago
- How fast can we brute force a 64-bit comparison?☆54Updated 5 years ago
- LL1 parser written in Python☆31Updated 3 years ago
- DES cracking using brute force algorithm and CUDA☆25Updated 8 years ago
- tamper resistant audit log☆18Updated 7 years ago
- C++ library for evaluating arithmetic circuits on batches of inputs☆15Updated 9 years ago
- Qtum's x86 VM☆57Updated 6 years ago
- Agent server for cross internet proxy and different protocol adapter that written in golang.☆12Updated 7 years ago
- A C++ String-like-class that does not save data as plain-text in memory. It makes live analysis of memory more difficult, as well as fore…☆12Updated 11 years ago
- My course notes for CMSC 330 (Organization of Programming Languages)☆10Updated 6 years ago
- Testing fork for Wei Dai's Crypto++☆11Updated 2 years ago
- Some notes on reverse engineering programs☆29Updated last year
- Public notes, etc. for CMPSCI 630, the UMass CS graduate systems course.☆21Updated 2 years ago
- JuCC - Jadavpur University Compiler Compiler☆44Updated 3 years ago
- A keylogger for Windows, developed as part of the "Build an Advanced Keylogger using C++ for Ethical Hacking!" course on Udemy☆17Updated 8 years ago
- A linux-like su/sudo on Windows. Transferred from https://github.com/DoubleLabyrinth/WindowsSudo.☆33Updated 6 years ago
- cgo wrappers around post-quantum cryptography primitives☆23Updated 6 years ago
- Experiments on C/C++ Exploits☆22Updated 5 years ago
- Python interface for ADT Pulse security systems☆16Updated 2 weeks ago
- Binary analysis. Capstone+Keystone+Unicorn = static and dynamic binary analysis☆12Updated 6 years ago
- 64 bit hobby OS☆26Updated 9 years ago
- Xoodyak, a lightweight and versatile cryptographic scheme implemented in Rust.☆30Updated 7 months ago
- The Secure Block Device Library is a software library that applies cryptographic confidentiality and integrity protection, including data…☆36Updated 7 years ago
- Command line utility for APK fingerprinting☆12Updated 2 years ago
- Small, fast, header only, zero dependency cryptographic library.☆24Updated 2 years ago
- A ptrace based sandbox. (PoC)☆14Updated 7 years ago
- is a random text generator based on context-free grammars, it uses a EBNF for grammar definitions.☆18Updated 6 months ago
- The TCP Scanner☆26Updated 3 years ago