sohamsadhu / Longest-common-subsequenceLinks
A collection of four algotihms implemented in C++ and compared to find the longest common subsequence in strings with binary digits and only genetic charactes ACGT.
☆12Updated 5 years ago
Alternatives and similar repositories for Longest-common-subsequence
Users that are interested in Longest-common-subsequence are comparing it to the libraries listed below
Sorting:
- C++ implementation of ssdeep-compatible fast fuzzy hashing☆37Updated 8 years ago
- ransomware_begone☆42Updated 9 years ago
- Tool to check if your computer is likely to be vulnerable to exploitable constant Read-Write-Execute (RWX) addresses (AVs vulnerability)☆52Updated 10 years ago
- ☆47Updated 5 years ago
- Contains some tricks to detect Sandboxes and gradually completed☆44Updated 8 years ago
- MALM: Malware Monitor☆49Updated 12 years ago
- C++ wrapper for YARA.☆45Updated 6 years ago
- Identifying and Disrupting Crypto-Ransomware (and Destructive Malware) using handle heurustics☆57Updated 10 years ago
- Sample libraries to be used with IAT Patcher☆36Updated 3 years ago
- CAPE monitor DLLs☆41Updated 6 years ago
- A minimal tool to extract shellcode from 64-bit PE binaries.☆54Updated 4 years ago
- Educational repository for learning about rootkits and Windows Kernel Hooks.☆49Updated 10 years ago
- From https://www.codeproject.com/Articles/81456/An-NTFS-Parser-Lib by cyb70289☆25Updated 7 years ago
- Dump Windows PE file information in C☆24Updated 10 years ago
- A linux rootkit works on kernel 4.0.X or higher☆37Updated 9 years ago
- ☆72Updated 12 years ago
- A session-0 capable dll injection utility☆76Updated 7 years ago
- ViDi Visual Disassembler (experimental)☆79Updated 4 months ago
- An obfuscation engine which obfuscates Intel x86 32-bit binary code.☆55Updated 7 years ago
- Archive of ransomware decryptors☆34Updated 8 years ago
- Automatically exported from code.google.com/p/ospy☆98Updated 10 years ago
- Malware Sandbox Emulation in Python @ HITCON 2018☆46Updated 7 years ago
- Set of python scripts to analyse PE32/PE64 binaries and to extract VB 5/6 headers and Visual Basic p-code functions.☆49Updated 10 years ago
- Experimental: Windows .text section compare - disk versus memory☆15Updated 11 years ago
- SSDT_process_hide_protect☆10Updated 11 years ago
- Load a Windows Kernel Driver☆94Updated 8 years ago
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆132Updated 12 years ago
- Source code of my KeygenMe V7 challenge☆22Updated 7 years ago
- Security Research and Development Framework☆104Updated 10 years ago
- ☆34Updated 7 years ago