markwkm / quicksortLinks
Parallel quicksort algorithms
☆16Updated 15 years ago
Alternatives and similar repositories for quicksort
Users that are interested in quicksort are comparing it to the libraries listed below
Sorting:
- Operating systems playground.☆16Updated 6 years ago
- Spectre exploit☆55Updated 8 years ago
- ☆15Updated 4 years ago
- A Bayesian Method for the Induction of Probalistic Networks from Data☆19Updated 8 years ago
- A semi fast tool to bruteforce values of LDAP injections over HTTP.☆14Updated 12 years ago
- cross site scripting framework plugin for metasploit☆17Updated 13 years ago
- Kerang is a Another Webshell Backdoor, For Educational Purposes!☆15Updated 8 years ago
- a python game inspired by Super Mario Kart☆13Updated 12 years ago
- Meltdown Exploit / Proof-of-concept / checks whether system is affected by Variant 3: rogue data cache load (CVE-2017-5754), a.k.a MELTDO…☆543Updated 7 years ago
- PoCs discovered through fuzzing which resulted in a CVE assignment.☆18Updated 5 years ago
- Virtual host brute forcer☆22Updated 12 years ago
- Socket programming tutorials in C, python, perl, java, winsock☆29Updated 12 years ago
- Dependencies for Veil 3☆17Updated 9 years ago
- This project has been done with Chen as part of system security course at SBU CS.☆12Updated 11 years ago
- Multithreaded SQL union bruteforcer☆16Updated 14 years ago
- Create shellcode from executable or assembly code☆12Updated 8 years ago
- A python implementation of the block cipher RC4☆41Updated 8 years ago
- Code for the paper EvilCoder: Automated Bug Insertion at ACSAC 2016☆46Updated 9 years ago
- runtime code injector for Linux☆26Updated 14 years ago
- Always Keep Learning☆58Updated 3 years ago
- exploit vulnerable c/c++ programms with buffer overflow attacks☆24Updated 3 years ago
- Simple windows backdoor command shell.☆20Updated 8 years ago
- NTPD remote DOS exploit and vulnerable container☆25Updated 8 years ago
- PoC code for crashing windows active directory☆35Updated 7 years ago
- Write Up I write for different CTFs☆12Updated 8 years ago
- A PoC implementation of the meltdown attack described in https://meltdownattack.com/meltdown.pdf☆134Updated 8 years ago
- An ARP based Operating System version scanner☆14Updated 13 years ago
- Anti live forensic linux LKM rootkit☆18Updated 8 years ago
- This is an example buffer overflow attack on a small vulnerable C program.☆80Updated 9 years ago
- Memory forensic tool for process resurrection starting from a memory dump☆20Updated 8 years ago