femto-dev / femtoLinks
Sequence Indexing and Search
☆108Updated 2 months ago
Alternatives and similar repositories for femto
Users that are interested in femto are comparing it to the libraries listed below
Sorting:
- WaterSlide is a streaming event-at-a-time architecture for processing metadata. It is designed to take in a set of streaming events from …☆116Updated 4 years ago
- Dynamic Visual Debugging / Reverse Engineering Toolsuite☆252Updated 6 years ago
- A public database for software and firmware hashes☆215Updated 8 years ago
- The SIMON and SPECK families of lightweight block ciphers. #nsacyber☆165Updated 5 years ago
- Superfast Line Counter☆51Updated 4 years ago
- Programmer De-anonymization from Binary Executables☆88Updated 7 years ago
- C/C++ implementation of the Smith-Waterman algorithm by using SIMD operations (e.g SSE4.1)☆23Updated 8 years ago
- Cybersecurity Mobile Investigation Workstation, a C++ Map-Reduce for Log Analysis☆32Updated 8 years ago
- Digest, stat, and copy files from one location to another in the same read pass☆337Updated 6 years ago
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆102Updated 8 years ago
- Assesses CPU security of embedded devices. #nsacyber☆139Updated 9 years ago
- immutable sorted string table library☆81Updated 8 months ago
- An AIMGP (Automatic Induction of Machine code by Genetic Programming) engine☆92Updated 6 years ago
- return-to-abort() - Using code introspection to prevent stack-smashing☆37Updated 4 years ago
- similarity digest hashing tool☆173Updated 4 years ago
- Data-driven automation platform☆308Updated 2 years ago
- The latest development version of rose. It may not pass all regression tests.☆106Updated 6 years ago
- Enable piping of internal command output to external commands☆70Updated 7 years ago
- A fast secure userspace pseudorandom number generator☆83Updated 11 years ago
- Various cryptographic backdoors and tools to detect them☆21Updated 10 years ago
- Provably Anonymous Overlay☆323Updated 10 years ago
- A collection of toy programs for teaching buffer overflow vulnerabilities.☆55Updated 9 years ago
- Some scripts to create a reproducible build for grsecurity☆31Updated 8 years ago
- CJAG is an open-source implementation of our cache-based jamming agreement.☆284Updated 3 years ago
- Vortex is a near real time IDS and network surveillance engine for TCP stream data.☆99Updated 8 years ago
- Giles Event Correlation Engine Compiler☆25Updated 10 years ago
- ☆97Updated 7 years ago
- A Tool for Embedding Strings in Vector Spaces☆58Updated 6 years ago
- HTTP framework☆48Updated 8 years ago
- Unix architecture evolution diagrams☆82Updated 6 years ago