AustinZuniga / DFA-implemented-pythonLinks
Deteministic Finite Automaton Implementation in Python Language
☆10Updated 7 years ago
Alternatives and similar repositories for DFA-implemented-python
Users that are interested in DFA-implemented-python are comparing it to the libraries listed below
Sorting:
- Random notes I want to backup.☆20Updated 3 years ago
- A small hobby Operating System. Supports 32-bit protected mode, paging and simple memory management.☆10Updated 10 years ago
- Collection of Assembly Programs in 8086☆19Updated 7 years ago
- A ptrace based sandbox. (PoC)☆14Updated 7 years ago
- DES cracking using brute force algorithm and CUDA☆25Updated 8 years ago
- Binary analysis. Capstone+Keystone+Unicorn = static and dynamic binary analysis☆12Updated 6 years ago
- A small C compiler written in Python for learning purposes☆41Updated 8 years ago
- rkhunter (Rootkit Hunter) is a Unix-based tool that scans for rootkits, backdoors and possible local exploits. It does this by comparing …☆15Updated 3 years ago
- A syscall hooking system for FreeBSD, NetBSD and also Linux.☆16Updated 4 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆19Updated 12 years ago
- Library to provide access to DWARF debugging information.☆25Updated 6 years ago
- Simple VM-based scripting language☆13Updated 5 years ago
- A keylogger for Windows, developed as part of the "Build an Advanced Keylogger using C++ for Ethical Hacking!" course on Udemy☆16Updated 8 years ago
- Reproducing malicious memory reading on Intel i5 and Intel Xeon using a Spectre attack☆87Updated 8 years ago
- Windows Optimizer☆27Updated 13 years ago
- Fast defcon 26 quals pow solver☆24Updated 7 years ago
- Simple and small library that allows disassembly of raw bytes for multiple architectures☆30Updated 2 years ago
- tamper resistant audit log☆17Updated 7 years ago
- A Unix rootkit☆16Updated 5 years ago
- Linux kernel modules developed by me for learning purposes☆19Updated 13 years ago
- ☆11Updated 9 years ago
- The TCP Scanner☆26Updated 3 years ago
- A linux-like su/sudo on Windows. Transferred from https://github.com/DoubleLabyrinth/WindowsSudo.☆33Updated 6 years ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆12Updated 5 years ago
- Miscellaneous old Exploit code and PoCs☆16Updated last year
- A semi-demi-working proof of concept for a mix of spectre and meltdown vulnerabilities☆128Updated 8 years ago
- ARP Poisoning Defense Scripts☆38Updated 8 years ago
- Experiments on C/C++ Exploits☆22Updated 5 years ago
- Toy framework for creating a VPN☆17Updated 13 years ago
- Some notes on reverse engineering programs☆29Updated last year