femto-dev / femtoLinks
Sequence Indexing and Search
☆109Updated 5 months ago
Alternatives and similar repositories for femto
Users that are interested in femto are comparing it to the libraries listed below
Sorting:
- WaterSlide is a streaming event-at-a-time architecture for processing metadata. It is designed to take in a set of streaming events from …☆117Updated 4 years ago
- Programmer De-anonymization from Binary Executables☆88Updated 7 years ago
- Superfast Line Counter☆51Updated 4 years ago
- Dynamic Visual Debugging / Reverse Engineering Toolsuite☆251Updated 6 years ago
- similarity digest hashing tool☆177Updated 5 years ago
- Digest, stat, and copy files from one location to another in the same read pass☆339Updated 6 years ago
- The SIMON and SPECK families of lightweight block ciphers. #nsacyber☆166Updated 6 years ago
- return-to-abort() - Using code introspection to prevent stack-smashing☆37Updated 5 years ago
- A public database for software and firmware hashes☆214Updated 9 years ago
- Data-driven automation platform☆309Updated 2 years ago
- Cybersecurity Mobile Investigation Workstation, a C++ Map-Reduce for Log Analysis☆32Updated 8 years ago
- An AIMGP (Automatic Induction of Machine code by Genetic Programming) engine☆92Updated 7 years ago
- C/C++ implementation of the Smith-Waterman algorithm by using SIMD operations (e.g SSE4.1)☆23Updated 9 years ago
- Various cryptographic backdoors and tools to detect them☆21Updated 10 years ago
- CJAG is an open-source implementation of our cache-based jamming agreement.☆284Updated 3 years ago
- A fast secure userspace pseudorandom number generator☆83Updated 11 years ago
- The latest development version of rose. It may not pass all regression tests.☆106Updated 6 years ago
- python-based build system used for building XED☆31Updated 2 weeks ago
- Hintjens' book production tools☆46Updated 9 years ago
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆101Updated 9 years ago
- 60 artisanal compiler crashes☆39Updated 9 years ago
- immutable sorted string table library☆82Updated 11 months ago
- A userland network manager with monitoring and limiting capabilities for macOS. #nsacyber☆79Updated 9 years ago
- Assesses CPU security of embedded devices. #nsacyber☆139Updated 9 years ago
- A Toolkit to assist with the investigation of Sandboxing software☆49Updated 9 years ago
- Just a simple radare2 Jupyter kernel☆111Updated 7 years ago
- Fast implementations of the SIMON and SPECK lightweight block ciphers for the SUPERCOP benchmark toolkit. #nsacyber☆49Updated 7 years ago
- Provably Anonymous Overlay☆325Updated 11 years ago
- Structured shrinking of unknown file formats☆96Updated 8 years ago
- Hazmat ECC arithmetic for Cryptography.io☆28Updated 5 years ago