femto-dev / femtoView external linksLinks
Sequence Indexing and Search
☆110Jun 27, 2025Updated 7 months ago
Alternatives and similar repositories for femto
Users that are interested in femto are comparing it to the libraries listed below
Sorting:
- WaterSlide is a streaming event-at-a-time architecture for processing metadata. It is designed to take in a set of streaming events from …☆118Mar 6, 2021Updated 4 years ago
- The SIMON and SPECK families of lightweight block ciphers. #nsacyber☆168Nov 12, 2019Updated 6 years ago
- Data-driven automation platform☆315Jun 13, 2023Updated 2 years ago
- Digest, stat, and copy files from one location to another in the same read pass☆340Jun 6, 2019Updated 6 years ago
- Intel Atom C2000 series discovery tool that parses log files and returns results if a positive match is found. #nsacyber☆30Jun 10, 2017Updated 8 years ago
- Automatically scores how well Windows systems have implemented some of the top 10 Information Assurance mitigation strategies. #nsacyber☆76May 25, 2016Updated 9 years ago
- Assesses CPU security of embedded devices. #nsacyber☆141Jun 1, 2016Updated 9 years ago
- Log-based transactional graph engine☆1,153Oct 16, 2024Updated last year
- Creates a code.gov code inventory JSON file based on GitHub repository information. #nsacyber☆30Jan 16, 2019Updated 7 years ago
- A proposed hardware-based method for stopping known memory corruption exploitation techniques. #nsacyber☆156May 10, 2017Updated 8 years ago
- An easy to use and portable Virtual Private Network (VPN) system built with Linux and a Raspberry Pi. #nsacyber☆989Jun 27, 2017Updated 8 years ago
- Popping boxes with Nmap☆18Apr 16, 2012Updated 13 years ago
- HTTP Shell is a CLI tool based on the Kui framework that provides developers a modern alternative to http clients for interacting with AP…☆12Dec 17, 2020Updated 5 years ago
- Infrastructure setup.☆10Jul 27, 2019Updated 6 years ago
- A place for scripts that describe web exploits to live so they can be used in testing☆20Mar 11, 2013Updated 12 years ago
- A JavaScript data structure for finding all intervals that overlap a point.☆13Nov 10, 2015Updated 10 years ago
- Deprecated version of REDHAWK SDR Framework - see https://github.com/RedhawkSDR/core-framework☆19Oct 7, 2016Updated 9 years ago
- A small Php package to fetch archive url snapshots from archive.org. Using it you can fetch complete list of snapshot urls of any year or…☆19Jun 20, 2021Updated 4 years ago
- Detects Windows and Linux systems with enabled Trusted Platform Modules (TPM) vulnerable to CVE-2017-15361. #nsacyber☆61Sep 4, 2018Updated 7 years ago
- Polyglot skipgram embeddings, and their many health benefits☆12Feb 2, 2020Updated 6 years ago
- gentoo overlay containing games ebuilds only☆16Jan 30, 2019Updated 7 years ago
- GCC/Clang inline assembly wrapper, C macro pre-processor based. ASM for human beings. Painless code migration from MSVC, Borland __asm {}…☆23Nov 15, 2023Updated 2 years ago
- Exposing the Neutrino EK: All the Naughty Bits (BSidesLV16)☆15Oct 10, 2016Updated 9 years ago
- Typescript implementation of Relaxed Radix Balanced Trees☆19Sep 15, 2024Updated last year
- OZONE Widget Framework☆329Jan 24, 2018Updated 8 years ago
- A kernel network manager with monitoring and limiting capabilities for macOS. #nsacyber☆112Mar 16, 2017Updated 8 years ago
- Firefox web extension for cross-website CloudFlare cookies☆13Dec 11, 2016Updated 9 years ago
- A generic data anomaly finder. You can use a beautiful web page, drag-and-drop your csv dataset and easily find the top N anomalies in th…☆33Oct 13, 2022Updated 3 years ago
- Compact Data Structures Library☆103Jun 20, 2022Updated 3 years ago
- Control the parameters of an Android system with the power of Xposed framework. 通过Xposed框架控制Android参数。☆16Mar 24, 2017Updated 8 years ago
- re2 for Java☆27Apr 13, 2015Updated 10 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆18Dec 3, 2015Updated 10 years ago
- A PRF with low multiplicative complexity☆20Feb 18, 2020Updated 5 years ago
- ☆19Jul 13, 2020Updated 5 years ago
- Enhanced textual vector layer searching in QGIS.☆79Jun 10, 2024Updated last year
- Fast implementations of the SIMON and SPECK lightweight block ciphers for the SUPERCOP benchmark toolkit. #nsacyber☆50Jun 13, 2018Updated 7 years ago
- ☆24Mar 24, 2018Updated 7 years ago
- WALKOFF-enabled applications. #nsacyber☆143Mar 14, 2019Updated 6 years ago
- Simple ECIES, ECDSA and AES library for Python, supporting OpenSSL and pure-Python environments☆26Nov 21, 2020Updated 5 years ago