femto-dev / femtoLinks
Sequence Indexing and Search
☆107Updated 3 weeks ago
Alternatives and similar repositories for femto
Users that are interested in femto are comparing it to the libraries listed below
Sorting:
- WaterSlide is a streaming event-at-a-time architecture for processing metadata. It is designed to take in a set of streaming events from …☆116Updated 4 years ago
- The SIMON and SPECK families of lightweight block ciphers. #nsacyber☆166Updated 5 years ago
- Programmer De-anonymization from Binary Executables☆86Updated 7 years ago
- Dynamic Visual Debugging / Reverse Engineering Toolsuite☆253Updated 6 years ago
- similarity digest hashing tool☆169Updated 4 years ago
- Cybersecurity Mobile Investigation Workstation, a C++ Map-Reduce for Log Analysis☆32Updated 8 years ago
- Superfast Line Counter☆50Updated 4 years ago
- immutable sorted string table library☆81Updated 6 months ago
- return-to-abort() - Using code introspection to prevent stack-smashing☆37Updated 4 years ago
- An AIMGP (Automatic Induction of Machine code by Genetic Programming) engine☆92Updated 6 years ago
- Vortex is a near real time IDS and network surveillance engine for TCP stream data.☆98Updated 8 years ago
- Data-driven automation platform☆305Updated 2 years ago
- Enable piping of internal command output to external commands☆71Updated 6 years ago
- python-based build system used for building XED☆31Updated 8 months ago
- A public database for software and firmware hashes☆215Updated 8 years ago
- Fast implementations of the SIMON and SPECK lightweight block ciphers for the SUPERCOP benchmark toolkit. #nsacyber☆46Updated 7 years ago
- strings for a Linux process' address space☆51Updated 12 years ago
- A userland network manager with monitoring and limiting capabilities for macOS. #nsacyber☆77Updated 8 years ago
- Assesses CPU security of embedded devices. #nsacyber☆139Updated 9 years ago
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆102Updated 8 years ago
- Just a simple radare2 Jupyter kernel☆111Updated 7 years ago
- Various cryptographic backdoors and tools to detect them☆21Updated 9 years ago
- Visual Interface heXadecimal dump☆52Updated 8 years ago
- Simple NGram Fast Indexer & Searcher☆37Updated 2 years ago
- A fast secure userspace pseudorandom number generator☆83Updated 11 years ago
- ☆97Updated 7 years ago
- C/C++ implementation of the Smith-Waterman algorithm by using SIMD operations (e.g SSE4.1)☆23Updated 8 years ago
- Introduction to using the Hammer parser construction toolkit by Meredith L. Patterson☆81Updated 8 years ago
- A kernel network manager with monitoring and limiting capabilities for macOS. #nsacyber☆107Updated 8 years ago
- CJAG is an open-source implementation of our cache-based jamming agreement.☆284Updated 3 years ago