DickingAround / InconvenientMessageDetection
☆14Updated 9 years ago
Alternatives and similar repositories for InconvenientMessageDetection:
Users that are interested in InconvenientMessageDetection are comparing it to the libraries listed below
- An example of PEG usage☆55Updated 8 years ago
- pentomino puzzle☆17Updated 9 years ago
- An exercise in cryptographic minimlism☆24Updated 10 years ago
- Configuration Tree for Python☆14Updated last year
- GrSL - the GSL-based random Sampling Library☆13Updated 13 years ago
- Genetic BF programming☆60Updated 10 years ago
- Back and forward buttons are obsolete☆63Updated 5 years ago
- Parser and compiler for MelodyScript, a DSL for writing melodies with chords.☆32Updated 9 years ago
- Read the TPP!☆28Updated last year
- Solving the Cheryl's Birthday problem -- with Prolog!☆14Updated 9 years ago
- [discontinued] Go off-the record, quickly.☆18Updated 8 years ago
- GDB is the GNU debugger. Forked from bminor's mirror.☆17Updated 3 years ago
- Password Generation using Markov models, Huffman trees, and Charles Dickens☆43Updated 6 years ago
- Play MineSweeper on Twitter.☆43Updated 9 years ago
- Finally a HTML that you can sight-read.☆75Updated 10 years ago
- indented outline markup -> dot☆51Updated 9 years ago
- my own language written by me☆21Updated 9 years ago
- The REN human friendly data notation☆53Updated 5 years ago
- String phone is a secure communications protocol and library geared towards embedded devices.☆14Updated 9 years ago
- Scicademy is an open access student research journal/database.☆39Updated 8 years ago
- A status application for small groups to keep each other in the loop☆16Updated 9 years ago
- An experimental minimalist WebBrowser☆46Updated 9 years ago
- CLI to concurrently compress, decompress using Brotli algorithm☆39Updated 5 years ago
- Smooth open-source Tetris clone with a few surprises.☆15Updated 9 years ago
- stupid website for the stupid hackathon☆51Updated 5 years ago
- Awesome mail filter with firewall like configuration.☆36Updated 7 years ago
- Use some TLS servers for trusted timestamping☆42Updated 9 years ago
- ☆70Updated 9 years ago
- Turn idle browsers into a compute farm.☆19Updated 7 years ago
- Don't run "curl | sh" again. Use "curl | shed" to verify scripts before running.☆31Updated 9 years ago