carthach / kBestViterbiView external linksLinks
Python code for doing k-Best or List decoding with the Viterbi algorithm
☆18May 4, 2017Updated 8 years ago
Alternatives and similar repositories for kBestViterbi
Users that are interested in kBestViterbi are comparing it to the libraries listed below
Sorting:
- Python bindings for yescrypt: memory-hard, NIST-compliant password hashing☆15Mar 9, 2024Updated last year
- advanced code generator for John the Ripper☆13May 6, 2018Updated 7 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆12Jan 6, 2022Updated 4 years ago
- JavaScript port of passwdqc. A password/passphrase strength checking and policy enforcement toolset.☆15Aug 8, 2019Updated 6 years ago
- Test Suite for John the Ripper☆25Dec 28, 2025Updated last month
- See README.txt for usage instructions. Use http://www.openwall.com/lists/john-users/ for support.☆17Aug 31, 2018Updated 7 years ago
- Go package scrypt implements the scrypt key derivation function as defined in Colin Percival's paper "Stronger Key Derivation via Sequent…☆35Jan 17, 2013Updated 13 years ago
- A diverse collection of useful (to me!) software written in C. Memory profiling, http server, editor, crash reporter, clang plugin, torre…☆22Feb 28, 2025Updated 11 months ago
- ☆23Sep 12, 2024Updated last year
- A very very fast VHDL implementation of the WPA2 encryption algorithm.☆26Jul 15, 2017Updated 8 years ago
- Specification of the binary modular crypt format for password hashes.☆34Apr 6, 2021Updated 4 years ago
- A tweakable block cipher☆31May 17, 2024Updated last year
- Minimal setup to trigger the xz backdoor☆29Oct 19, 2024Updated last year
- Linux install and network setup for SNAPS☆14Sep 7, 2019Updated 6 years ago
- Create database files for the genealogytree LaTeX package from GEDCOM files☆11Mar 11, 2025Updated 11 months ago
- Universal BIOS Recovery console for x86 PCs☆47May 10, 2024Updated last year
- ☆12Nov 22, 2024Updated last year
- Tool to archive RPM packages and attest to their authenticity☆14Jun 5, 2025Updated 8 months ago
- A command-line tool that uses AWS KMS to encrypt secrets once, and decrypts them from multiple AWS regions.☆13Apr 11, 2018Updated 7 years ago
- Controlling your MSR with Visual Basic 6☆19Jul 1, 2015Updated 10 years ago
- Aquarium: A Comprehensive Framework for Exploring Predator-Prey Dynamics through Multi-Agent Reinforcement Learning Algorithms☆13Apr 3, 2024Updated last year
- A scanner for DKIM selectors.☆12Nov 5, 2018Updated 7 years ago
- The spell program from the 10th Edition Unix system☆10Jul 12, 2020Updated 5 years ago
- A collection of samples for development and testing of John the Ripper and other password security auditing and password recovery tools☆43Jan 14, 2026Updated last month
- 🗿 SAT solver wrappers for Kotlin☆11Mar 2, 2024Updated last year
- A simple python script to generate nested folders based on user input. The script will also name and place a template report document and…☆11Jun 19, 2025Updated 7 months ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- ☆10Aug 25, 2020Updated 5 years ago
- Visual graph rewriting platform☆10Jun 3, 2025Updated 8 months ago
- A Linux/GNU systems programming library in C.☆10Feb 7, 2026Updated last week
- SymPy based framework for optimized code generation for BSSN formulation of Einstein equation for heterogeneous platforms.☆11Aug 18, 2025Updated 5 months ago
- Theory propagator for linear programming using clingo theory language and interface.☆11Dec 2, 2021Updated 4 years ago
- Official implementation for "How Should We Meta-Learn Reinforcement Learning Algorithms?"☆23Sep 7, 2025Updated 5 months ago
- Equivalent and redundant mutant detection with e-graphs!!!☆13Jun 14, 2023Updated 2 years ago
- top usernames from azure survey 2025☆14Apr 25, 2025Updated 9 months ago
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 3 years ago
- A MyBB plugin that upgrades the password hash algorithm and converts old passwords on the fly.☆10Nov 17, 2023Updated 2 years ago
- Difflog: Synthesizing Datalog Programs using Numerical Relaxation☆12Sep 26, 2019Updated 6 years ago
- helper classes for arduino dev. Tested with GTest+GMock.☆10Aug 26, 2016Updated 9 years ago