femto-dev / femtoLinks
Sequence Indexing and Search
☆109Updated 4 months ago
Alternatives and similar repositories for femto
Users that are interested in femto are comparing it to the libraries listed below
Sorting:
- WaterSlide is a streaming event-at-a-time architecture for processing metadata. It is designed to take in a set of streaming events from …☆115Updated 4 years ago
- Dynamic Visual Debugging / Reverse Engineering Toolsuite☆251Updated 6 years ago
- A public database for software and firmware hashes☆214Updated 9 years ago
- Superfast Line Counter☆51Updated 4 years ago
- Cybersecurity Mobile Investigation Workstation, a C++ Map-Reduce for Log Analysis☆32Updated 8 years ago
- C/C++ implementation of the Smith-Waterman algorithm by using SIMD operations (e.g SSE4.1)☆23Updated 8 years ago
- The SIMON and SPECK families of lightweight block ciphers. #nsacyber☆165Updated 6 years ago
- Programmer De-anonymization from Binary Executables☆88Updated 7 years ago
- similarity digest hashing tool☆174Updated 5 years ago
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆101Updated 9 years ago
- Provably Anonymous Overlay☆324Updated 11 years ago
- A fast secure userspace pseudorandom number generator☆83Updated 11 years ago
- immutable sorted string table library☆82Updated 10 months ago
- Hintjens' book production tools☆46Updated 9 years ago
- Snabb: simple and fast packet networking☆81Updated 6 years ago
- Vortex is a near real time IDS and network surveillance engine for TCP stream data.☆98Updated 8 years ago
- Digest, stat, and copy files from one location to another in the same read pass☆338Updated 6 years ago
- A Tool for Embedding Strings in Vector Spaces☆58Updated 6 years ago
- strings for a Linux process' address space☆51Updated 12 years ago
- Analysis of archived Tor relay RSA public keys☆24Updated 7 years ago
- Just a simple radare2 Jupyter kernel☆111Updated 7 years ago
- Assesses CPU security of embedded devices. #nsacyber☆139Updated 9 years ago
- An AIMGP (Automatic Induction of Machine code by Genetic Programming) engine☆92Updated 6 years ago
- Data-driven automation platform☆309Updated 2 years ago
- CJAG is an open-source implementation of our cache-based jamming agreement.☆284Updated 3 years ago
- Various cryptographic backdoors and tools to detect them☆21Updated 10 years ago
- a tiny, custom launcher that handles namespacing, control groups, chroot'ing, and more☆55Updated 3 years ago
- A userland network manager with monitoring and limiting capabilities for macOS. #nsacyber☆78Updated 8 years ago
- Dear user: This is a git mirror of our Mercurial repository in https://bokken.inguma.eu that you can use if you prefer to use pull reque…☆120Updated 8 years ago
- Simple NGram Fast Indexer & Searcher☆37Updated 2 years ago