femto-dev / femtoLinks
Sequence Indexing and Search
☆108Updated 2 months ago
Alternatives and similar repositories for femto
Users that are interested in femto are comparing it to the libraries listed below
Sorting:
- WaterSlide is a streaming event-at-a-time architecture for processing metadata. It is designed to take in a set of streaming events from …☆116Updated 4 years ago
- Dynamic Visual Debugging / Reverse Engineering Toolsuite☆252Updated 6 years ago
- Programmer De-anonymization from Binary Executables☆88Updated 7 years ago
- A public database for software and firmware hashes☆215Updated 8 years ago
- Superfast Line Counter☆51Updated 4 years ago
- Cybersecurity Mobile Investigation Workstation, a C++ Map-Reduce for Log Analysis☆32Updated 8 years ago
- C/C++ implementation of the Smith-Waterman algorithm by using SIMD operations (e.g SSE4.1)☆23Updated 8 years ago
- The SIMON and SPECK families of lightweight block ciphers. #nsacyber☆165Updated 5 years ago
- similarity digest hashing tool☆171Updated 4 years ago
- An AIMGP (Automatic Induction of Machine code by Genetic Programming) engine☆92Updated 6 years ago
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆102Updated 8 years ago
- CJAG is an open-source implementation of our cache-based jamming agreement.☆284Updated 3 years ago
- Just a simple radare2 Jupyter kernel☆111Updated 7 years ago
- ☆97Updated 7 years ago
- Assesses CPU security of embedded devices. #nsacyber☆139Updated 9 years ago
- Microcode parser for AMD, Intel, and VIA processors☆134Updated 9 years ago
- return-to-abort() - Using code introspection to prevent stack-smashing☆37Updated 4 years ago
- A userland network manager with monitoring and limiting capabilities for macOS. #nsacyber☆77Updated 8 years ago
- Various cryptographic backdoors and tools to detect them☆21Updated 9 years ago
- Snabb: simple and fast packet networking☆81Updated 5 years ago
- Visual Interface heXadecimal dump☆52Updated 8 years ago
- Vortex is a near real time IDS and network surveillance engine for TCP stream data.☆99Updated 8 years ago
- A collection of toy programs for teaching buffer overflow vulnerabilities.☆55Updated 9 years ago
- immutable sorted string table library☆81Updated 7 months ago
- strings for a Linux process' address space☆51Updated 12 years ago
- Programmable Dropbox for secure IoT☆70Updated 8 years ago
- python-based build system used for building XED☆32Updated last week
- Provably Anonymous Overlay☆323Updated 10 years ago
- Fast implementations of the SIMON and SPECK lightweight block ciphers for the SUPERCOP benchmark toolkit. #nsacyber☆46Updated 7 years ago
- Unix architecture evolution diagrams☆82Updated 6 years ago