Sequence Indexing and Search
☆110Jun 27, 2025Updated 8 months ago
Alternatives and similar repositories for femto
Users that are interested in femto are comparing it to the libraries listed below
Sorting:
- WaterSlide is a streaming event-at-a-time architecture for processing metadata. It is designed to take in a set of streaming events from …☆119Mar 6, 2021Updated 5 years ago
- Digest, stat, and copy files from one location to another in the same read pass☆341Jun 6, 2019Updated 6 years ago
- The SIMON and SPECK families of lightweight block ciphers. #nsacyber☆169Nov 12, 2019Updated 6 years ago
- Data-driven automation platform☆318Jun 13, 2023Updated 2 years ago
- Identifies unexpected and prohibited certificate authority certificates on Windows systems. #nsacyber☆114Jun 2, 2016Updated 9 years ago
- Intel Atom C2000 series discovery tool that parses log files and returns results if a positive match is found. #nsacyber☆30Jun 10, 2017Updated 8 years ago
- Automatically scores how well Windows systems have implemented some of the top 10 Information Assurance mitigation strategies. #nsacyber☆76May 25, 2016Updated 9 years ago
- Log-based transactional graph engine☆1,158Feb 25, 2026Updated 3 weeks ago
- A proposed hardware-based method for stopping known memory corruption exploitation techniques. #nsacyber☆156May 10, 2017Updated 8 years ago
- OZONE Widget Framework☆330Jan 24, 2018Updated 8 years ago
- Java implementation of Lempel-Ziv Jaccard Distance☆21Sep 17, 2017Updated 8 years ago
- A flexible, easy to use, automation framework allowing users to integrate their capabilities and devices to cut through the repetitive, t…☆1,229Dec 12, 2022Updated 3 years ago
- Fast implementations of the SIMON and SPECK lightweight block ciphers for the SUPERCOP benchmark toolkit. #nsacyber☆50Jun 13, 2018Updated 7 years ago
- Fast and scalable minimal perfect hashing for massive key sets☆72Mar 6, 2020Updated 6 years ago
- Exposing the Neutrino EK: All the Naughty Bits (BSidesLV16)☆16Oct 10, 2016Updated 9 years ago
- Enhanced textual vector layer searching in QGIS.☆79Jun 10, 2024Updated last year
- Detects Windows and Linux systems with enabled Trusted Platform Modules (TPM) vulnerable to CVE-2017-15361. #nsacyber☆61Sep 4, 2018Updated 7 years ago
- Compact Data Structures Library☆102Jun 20, 2022Updated 3 years ago
- A WebSocket library for use with Apache Accumulo☆64Mar 4, 2026Updated 2 weeks ago
- A place for scripts that describe web exploits to live so they can be used in testing☆20Mar 11, 2013Updated 13 years ago
- Some NSE scripts to search information from routers☆10Nov 18, 2015Updated 10 years ago
- Configuration guidance for implementing Pass-the-Hash mitigations. #nsacyber☆200Nov 25, 2016Updated 9 years ago
- The Decision Maximizer 3000 optimization project☆10Jan 16, 2022Updated 4 years ago
- ☆18May 28, 2025Updated 9 months ago
- SkillTree☆28Jul 12, 2025Updated 8 months ago
- Memory forensics of virtualization environments☆48Oct 4, 2014Updated 11 years ago
- SkillTree skills-client-examples☆31Jan 14, 2026Updated 2 months ago
- Single Header scripting language made from scratch!☆11Nov 13, 2020Updated 5 years ago
- ☆17Nov 25, 2015Updated 10 years ago
- The Dictionary service provides access to the data dictionary and edge dictionary. These services provide metadata about fields that are …☆23Mar 11, 2025Updated last year
- Control the parameters of an Android system with the power of Xposed framework. 通过Xposed框架控制Android参数。☆16Mar 24, 2017Updated 8 years ago
- Proactively-secure Accumulo with Cryptographic Enforcement (PACE) adds client-side encryption and signatures to Accumulo.☆15Aug 15, 2023Updated 2 years ago
- Syndie is an open source system for operating distributed forums, offering a secure and consistent interface to various anonymous and non…☆41Jul 17, 2025Updated 8 months ago
- ☆12Mar 1, 2017Updated 9 years ago
- A small Php package to fetch archive url snapshots from archive.org. Using it you can fetch complete list of snapshot urls of any year or…☆19Jun 20, 2021Updated 4 years ago
- Last-seen sketch implementation in Go☆16Dec 15, 2020Updated 5 years ago
- [DEPRECATED] Omnibus package for Graylog☆13Apr 26, 2019Updated 6 years ago
- Evil Twin Attack Bash script☆12Feb 21, 2016Updated 10 years ago
- Provides situational awareness of Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) networks in suppo…☆1,035Feb 24, 2020Updated 6 years ago