markwkm / quicksortLinks
Parallel quicksort algorithms
☆16Updated 15 years ago
Alternatives and similar repositories for quicksort
Users that are interested in quicksort are comparing it to the libraries listed below
Sorting:
- This project has been done with Chen as part of system security course at SBU CS.☆12Updated 11 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆18Updated 12 years ago
- simple rootkit for computer security class☆14Updated 13 years ago
- A Unix rootkit☆16Updated 5 years ago
- Rootkit tutorial code for the Beneath C Level blog - http://beneathclevel.blogspot.co.uk/☆21Updated 12 years ago
- This version touches disk for registry persistence.☆26Updated 10 years ago
- BitBender is a byte manipulation tool☆12Updated 7 years ago
- Virtual host brute forcer☆22Updated 12 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Updated 11 years ago
- ARP Poisoning Defense Scripts☆38Updated 8 years ago
- DHCP attack tool☆21Updated last year
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 14 years ago
- Simple windows backdoor command shell.☆20Updated 8 years ago
- PoC code for crashing windows active directory☆35Updated 7 years ago
- Windows Malware☆41Updated 12 years ago
- Anti live forensic linux LKM rootkit☆18Updated 8 years ago
- LD_PRELOAD rootkit☆24Updated 11 years ago
- A semi fast tool to bruteforce values of LDAP injections over HTTP.☆13Updated 12 years ago
- Debugger checks in 3 ways☆19Updated 8 years ago
- All tools you needed during penetration testing.☆18Updated 8 years ago
- Microsoft Office / COM Object DLL Planting☆15Updated 9 years ago
- A linux rootkit works on kernel 4.0.X or higher☆37Updated 9 years ago
- Source code of my KeygenMe V7 challenge☆22Updated 7 years ago
- Application Security library☆11Updated 13 years ago
- A Bayesian Method for the Induction of Probalistic Networks from Data☆19Updated 8 years ago
- C++ Keylogger for windows 7. Works with DLL injection on explorer.exe☆26Updated 11 years ago
- A rootkit for linux kernel >= 3.0☆19Updated 11 years ago
- cross site scripting framework plugin for metasploit☆17Updated 13 years ago
- Kerang is a Another Webshell Backdoor, For Educational Purposes!☆15Updated 8 years ago
- runtime code injector for Linux☆26Updated 14 years ago