A variant of NIST SP 800-22 revison.1a test suit
☆19Sep 18, 2019Updated 6 years ago
Alternatives and similar repositories for A-variant-of-NIST-SP-800-22-test-suit
Users that are interested in A-variant-of-NIST-SP-800-22-test-suit are comparing it to the libraries listed below
Sorting:
- A C program to generate random data using several random models, with parameterized non uniformities and flexible output formats.☆29Nov 26, 2025Updated 3 months ago
- micro service lib, based on grpc cpp☆16May 5, 2025Updated 10 months ago
- Funtracer is a simple raytracer written in Go☆14Sep 3, 2023Updated 2 years ago
- The source codes of the SWAN cipher☆11Oct 5, 2019Updated 6 years ago
- This repo is created to perform I/O Request Packet (IRP) driven ransomware analysis where the IRP logs were collected during ransomware e…☆11Aug 14, 2020Updated 5 years ago
- incubator-brpc uses as submodule in ByConity☆14Dec 5, 2024Updated last year
- A minifilter driver to capture processes behavior from a filesystem prospective.☆17Oct 5, 2024Updated last year
- 对一些开源cms官网的更新,github commit进行监控的工具☆11Dec 27, 2018Updated 7 years ago
- OFDM code☆13Apr 3, 2021Updated 4 years ago
- s2-061批量扫描兼命令执行exp☆17Jan 20, 2021Updated 5 years ago
- Using Python to simulate multipath fading channel☆33Aug 16, 2017Updated 8 years ago
- Hamming Error Correction Codes (SECDED)☆25Jun 3, 2020Updated 5 years ago
- A python implementation of the SP800-22 Rev 1a PRNG test suite.☆169May 31, 2021Updated 4 years ago
- Simulation of Multipath Fading Channels: Improvements of Jake’s Simulator☆29Aug 31, 2018Updated 7 years ago
- Economics of Ransomware | Dataset☆15May 2, 2018Updated 7 years ago
- ☆12Aug 4, 2018Updated 7 years ago
- Implementation of A New Burrows Wheeler Transform Markov Distance☆12Apr 19, 2020Updated 5 years ago
- Training and testing pipeline for ransomware classification based on screenshots of the splash screens or ransom notes (https://arxiv.org…☆11Jul 19, 2020Updated 5 years ago
- Practical String Searching☆12Dec 20, 2019Updated 6 years ago
- Create an entire YARA rule via Python? Whhhhhhaatttt?☆74Jan 12, 2019Updated 7 years ago
- ☆10Dec 30, 2020Updated 5 years ago
- ☆13Aug 31, 2024Updated last year
- A python powered normalized compression distance (NCD) calculator.☆14Jan 26, 2016Updated 10 years ago
- ☆10Jun 16, 2022Updated 3 years ago
- ☆11Feb 8, 2026Updated last month
- [ICLR 2025 SCI-FM Workshop] Lemur: Log Parsing with Entropy Sampling and Chain-of-Thought Merging☆14Mar 27, 2025Updated 11 months ago
- ☆16Dec 21, 2023Updated 2 years ago
- AES文件加密解密☆10Apr 26, 2023Updated 2 years ago
- 使用卷积神经网络识别恶意软件,其特点是把文件的每个字节都当做输入☆16Oct 14, 2024Updated last year
- 一个记录本机IP的小程序☆35Jan 8, 2025Updated last year
- FEM micromagnetic simulator☆11Updated this week
- Corresponding code to "Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features" @ USENIX Secur…☆11Aug 5, 2019Updated 6 years ago
- CNN for detecting malicious PDF☆11Jul 25, 2024Updated last year
- Simple MATLAB toolbox for deep learning network: Version 1.0.3☆16Apr 16, 2019Updated 6 years ago
- A Guide for Encode Categorical Variables, with implementations and examples in Python.☆11Sep 9, 2020Updated 5 years ago
- Parse and Generate binary plists and NSKeyedArchiver archives☆16Oct 5, 2022Updated 3 years ago
- ☆14Mar 28, 2018Updated 7 years ago
- The code for the Subformer, from the EMNLP 2021 Findings paper: "Subformer: Exploring Weight Sharing for Parameter Efficiency in Generati…☆16Sep 1, 2021Updated 4 years ago
- Audit du SMSI selon l'ISO 27001☆13Feb 23, 2022Updated 4 years ago