This is a book in Romanian on algorithms and programming contest strategies. It is written in LaTeX and TikZ. The original dates from 1997 and was written in Word. I converted the figures, formulae and tables and fixed some typos, but left the text and code untouched (for better or worse).
☆10Mar 31, 2018Updated 8 years ago
Alternatives and similar repositories for psycho
Users that are interested in psycho are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆13Dec 26, 2015Updated 10 years ago
- advent of code 2019 repo☆17Dec 16, 2019Updated 6 years ago
- A very handy utility for preparing tests for contests.☆13May 6, 2024Updated 2 years ago
- Competitive Programming☆47Apr 26, 2025Updated last year
- Cython bindings for libpcap and libtins☆10Dec 19, 2016Updated 9 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Repository for the work of the CoSAI Technical Steering Committee (TSC)☆21May 3, 2026Updated last week
- annotated dataset of cyber-security related tweets☆22May 10, 2021Updated 4 years ago
- CITL's static analysis engine for native code artifacts☆20Apr 29, 2021Updated 5 years ago
- ☆12Aug 1, 2025Updated 9 months ago
- PoC Reverse Text segment ELF File infector☆14Feb 28, 2020Updated 6 years ago
- Function decorator for Django REST Framework for specifying and constraining API parameters☆18May 3, 2018Updated 8 years ago
- API logger plugin for Intel Pintool☆14Nov 19, 2017Updated 8 years ago
- Basic x86 Symbolic Execution for educational purposes☆18May 8, 2017Updated 9 years ago
- RFCs for changes to Rust☆13Apr 15, 2026Updated 3 weeks ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- The Binary Mutation code based on Uroboros☆14Feb 20, 2019Updated 7 years ago
- LambdaZoom is a Python-based AWS Lambda function which converts uploaded images to the Deep Zoom tiled image format supported by OpenSead…☆10Feb 4, 2022Updated 4 years ago
- Collection of tools related to 7z, stego, and CTFs☆14Oct 9, 2020Updated 5 years ago
- Writeups for PicoCTF2017 Challenges☆10Apr 16, 2017Updated 9 years ago
- CMU's attack lab☆13Sep 7, 2023Updated 2 years ago
- [unmaintained] helpers used to draw and animate with python (cairo)☆14Jun 24, 2016Updated 9 years ago
- Streaming shapefile parser☆18Jul 28, 2016Updated 9 years ago
- x86 Microkernel☆16Apr 1, 2020Updated 6 years ago
- Short for Good Ware; it assists Reverse Engineers in the analysis of Windows Malware.☆24Jun 19, 2012Updated 13 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- EasyCTF IV☆10Feb 21, 2018Updated 8 years ago
- collection of used Tools for CTFs☆15Oct 24, 2021Updated 4 years ago
- prebuild angr wheels for Windows on x86_64☆15Jul 21, 2018Updated 7 years ago
- Cheat-Sheet with events too look out for when analysing malicious Office documents☆19Oct 21, 2017Updated 8 years ago
- Targeted patcher for CGC binaries. CGrex was used only during the CGC qualifier event, and is OBSOLETE. For the CFE, we used patcherex (g…☆15Sep 2, 2016Updated 9 years ago
- Writeups and solutions for RC3CTF 2016☆14Nov 23, 2016Updated 9 years ago
- ☆17Sep 29, 2023Updated 2 years ago
- Syllabus and course material for Ideation & Methodologies☆12Dec 3, 2018Updated 7 years ago
- Binary Ninja script to decrypt strings in Mirai samples☆21Jun 30, 2021Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Conway's Game of Life with slow decay☆11Jul 10, 2020Updated 5 years ago
- A collection of phishing techniques used to evade detection. #nolockdown☆23Aug 28, 2025Updated 8 months ago
- SafeInit protects software from uninitialized read vulnerabilities - code released for NDSS 2017☆26May 5, 2021Updated 5 years ago
- utility to get the plain-text value of a node according to the `innerText` algorithm☆25Apr 16, 2024Updated 2 years ago
- Compile scripts for PyQt5 (Qt 5.6.0), Python 2.7.11 and MSVC 2013.☆17Jun 26, 2016Updated 9 years ago
- 100% XXTEA authenticated, chunked file encryption☆18Feb 14, 2021Updated 5 years ago
- CTF(x) 2016 problem statements, files, and writeups☆16Jan 30, 2019Updated 7 years ago