90 projects for "algorithm" with 1 filter applied:

  • Gen AI apps are built with MongoDB Atlas Icon
    Gen AI apps are built with MongoDB Atlas

    Build gen AI apps with an all-in-one modern database: MongoDB Atlas

    MongoDB Atlas provides built-in vector search and a flexible document model so developers can build, scale, and run gen AI apps without stitching together multiple databases. From LLM integration to semantic search, Atlas simplifies your AI architecture—and it’s free to get started.
    Start Free
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 1
    CRC RevEng

    CRC RevEng

    Arbitrary-precision CRC calculator and algorithm finder

    CRC RevEng is a portable, arbitrary-precision CRC calculator and algorithm finder. It calculates CRCs using any of the 113 preset algorithms, or a user-specified algorithm to any width. It calculates reversed CRCs to give the bit pattern that produces a desired forward CRC. CRC RevEng also reverse-engineers any CRC algorithm from sufficient correctly formatted message-CRC pairs and optional known parameters.
    Leader badge
    Downloads: 90 This Week
    Last Update:
    See Project
  • 2
    BeeBEEP (Free Office Messenger)

    BeeBEEP (Free Office Messenger)

    You can message and share files inside your intranet without a server.

    BeeBEEP is a secure (encryption based on Rijndael Algorithm, AES) peer to peer office messenger. You can talk and send files with all your colleagues inside a local area network such of an office, home or internet cafe without a server. BeeBEEP works also with VPNs. This serverless application is indispensable in all those places where privacy and security an essential requirement. For more info visit: https://www.beebeep.net
    Leader badge
    Downloads: 2,296 This Week
    Last Update:
    See Project
  • 3

    cline

    Command line tool for counting source code lines

    ...You may specify file suffixes to include or exclude as well as regular expressions for code lines that shall be excluded (e.g. to exclude comments). By default a heuristic algorithm skips binary files. You may configure the restrictiveness of this algorithm with command line options.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 4
    Nyquist

    Nyquist

    Nyquist is a language for sound synthesis and music composition.

    Nyquist is a language for sound synthesis and music composition. It is implemented in C and C++ and runs on Win32, OSX, and Linux. Nyquist combines a powerful functional programming style with efficient signal-processing primitives. Nyquist is also embedded as a scripting language in Audacity.
    Leader badge
    Downloads: 44 This Week
    Last Update:
    See Project
  • Build Securely on AWS with Proven Frameworks Icon
    Build Securely on AWS with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 5

    Largest Generic Hash and HMAC Program

    57 Hash Functions In One Program, plus each with HMAC or KMAC

    FEHASHMAC is the largest collection of publicly known hash algorithms integrated into a command-line utility. FEHASHMAC contains a set of known test vectors and results for each algorithm such that the correct implementation for each hardware platform and compiler version can directly be verified. Currently 57 hash algorithms like sha1 sha224 sha256 sha384 sha512 and variants, sha3 and shake, all SHA3 finalists and blake3, md2 md4 md5 md6, rmd128 rmd160 rmd256 rmd320, whirl gost lash160 lash256 lash384 lash512 tiger2 and RFC 2104 HMAC and KMAC support are included, plus SHA3 extensions kmac128, kmac256, kmacxof128, kmacxof256 for message.
    Leader badge
    Downloads: 4 This Week
    Last Update:
    See Project
  • 6

    calc: C-style arbitrary precision system

    Calc: arbitrary precision C-like arithmetic & calculator

    Calc is arbitrary precision C-like arithmetic system that is a calculator, an algorithm prototyper and mathematical research tool. Calc comes with a rich set of builtin mathematical and programmatic functions.
    Leader badge
    Downloads: 16 This Week
    Last Update:
    See Project
  • 7
    Hack Instagram Account with AI

    Hack Instagram Account with AI

    AI-driven Instagram account security hacking

    Hack Instagram Password - AI-Powered Tool This application was made using the API of PASS REVELATOR, for more information about Instagram hacking account and security, please visit their website: https://www.passwordrevelator.net/en/passdecryptor Advanced machine learning tool for Instagram password security assessment. Features AI-driven brute force attacks, pattern recognition, and neural network prediction. KEY FEATURES: • AI-Powered Password Generation - Machine learning...
    Downloads: 10 This Week
    Last Update:
    See Project
  • 8
    Iterate is an implementation of the Bravais-lattice-finding algorithm from: Andrews and Bernstein, Acta Cryst. (1988). A44, 1009-1018 Lattices and Reduced Cells as Points in 6-Space and Selection of Bravais Lattice Type by Projections.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Bandicoot

    Bandicoot

    fast C++ library for GPU linear algebra & scientific computing

    * Fast GPU linear algebra library (matrix maths) for the C++ language, aiming towards a good balance between speed and ease of use * Provides high-level syntax and functionality deliberately similar to Matlab * Provides an API that is aiming to be compatible with Armadillo for easy transition between CPU and GPU linear algebra code * Useful for algorithm development directly in C++, or quick conversion of research code into production environments * Distributed under the permissive Apache 2.0 license, useful for both open-source and proprietary (closed-source) software * Can be used for machine learning, pattern recognition, computer vision, signal processing, bioinformatics, statistics, finance, etc * Downloads: http://coot.sourceforge.io/download.html * Documentation: http://coot.sourceforge.io/docs.html * Bug reports: http://coot.sourceforge.io/faq.html * Git repo: https://gitlab.com/conradsnicta/bandicoot-code
    Downloads: 8 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 10
    [OFFICIAL] tinyfiledialogs C C++ v3.21.2

    [OFFICIAL] tinyfiledialogs C C++ v3.21.2

    inputbox password WIN OSX GTK QT Console VCPKG C# Lua R Fortran Pascal

    one C/C++ file & header provides 8 functions: - beep - tray notify popup - message & question - input & password - save file - open file(s) - select folder - color picker complements OpenGL Vulkan GLFW GLUT GLUI VTK SFML TGUI SDL Ogre Unity3d ION OpenCV CeGui MathGL GLM CPW GLOW Open3D ImGui MyGui GLT NGL STB Nuklear Fenster MicroUi & GUI-less programs NO INIT NO MAIN LOOP NO LINKING NO INCLUDE win (XP to 11) ASCII MBCS UTF-8 UTF-16 (wchar_t) - native...
    Leader badge
    Downloads: 85 This Week
    Last Update:
    See Project
  • 11
    Nest-o-Patch

    Nest-o-Patch

    Software for analysis of patch-clamp recordings and other wave data

    This program was designed mainly for preconditioning and analysis of electrophysiological data, including patch-clamp and 2-electrode voltage clamp recordings. The program includes tools both for basic analysis of whole-cell recordings or analysis of single channel properties. Program can display and analyse long traces incuding many sweeps, series and even groups simultaneously. Current amplitudes or time intervals are easily measured. Single channel conductance, kinetics, NPo, as well as...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 12
    gendasm

    gendasm

    Generic Code-Seeking Diassembler with Fuzzy-Function Analyzer

    ...It will disassemble the code and follow through branches to assist in the separation of code and data. Its included Fuzzy Function Analyzer companion uses a DNA Sequence Alignment Algorithm to locate similar code in multiple binaries to facilitate reverse-engineering and/or code recovery. The original purpose of the Fuzzy Function Analyzer was to assist in code recovery where the source code for the current binaries got lost, yet the source code for an old binary was retained. The Fuzzy Function Analyzer allows you to match up known functions between the two binaries so you can concentrate on disassembling and reverse engineering the parts that are different and recover the code for the current binary that got lost.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13

    cppcrypto

    C++ cryptographic library (modern hash functions, ciphers, KDFs)

    ...Includes sample command-line tools: - 'digest' - for calculating and verifying file checksum(s) using any of the supported hash algorithms (similar to md5sum or RHash). - 'cryptor' - for file encryption using Serpent-256 algorithm in AEAD mode. Check out the cppcrypto web site linked below for programming documentation.
    Leader badge
    Downloads: 3 This Week
    Last Update:
    See Project
  • 14
    Geophysical Library is a C++-library to handle geophysical data. At the moment the focus is on magnetotelluric and seismic data. It also includes a genetic algorithm for data inversion, signal processing and statistics routines.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15

    ZX Master Mind

    Master Mind Game developed for ZX Spectrum

    Written in BASIC with core routines in Assembler for Z80. An 8 bit computer can guess your secret code at the maximum 5 attempts.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    WiFi Password Recovery

    WiFi Password Recovery

    A free utility to recover the passwords of wireless networks

    ...For example if you forgot the password of a WiFi network (which you have entered in the past), you can easily recover it thanks to this tool. WiFi Password Recovery provides a very simple user interface which shows also other informations (SSID, Interface, Security type, Encryption algorithm) for each wireless network. The program is able to recover the passwords of wireless networks which use the following security types: WEP, WPA, WPA-PSK, WPA2, WPA2-PSK.* GitHub Repository: https://github.com/EvolSoft/WiFi-Password-Recovery *Note: On Windows XP the passwords of WiFi networks using WPA security will be shown as 64 HEX digits. ...
    Downloads: 49 This Week
    Last Update:
    See Project
  • 17
    an implementation of the Inflate decompression algorithm corresponding to deflate compression as used by gzip and compatible with RFC 1951 Written in Z80 assembly language, with memory paging support for the Sam Coupe
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    D-Tailor

    D-Tailor

    D-Tailor: automated analysis and design of DNA sequences

    ...DNA-Tailor (D-Tailor) is a fully extendable software framework for biological sequence analysis and multi-objective sequence design. D-Tailor permits the seamless integration of an arbitrary number of sequence analysis tools into a Monte-Carlo algorithm that evolves synthetic sequences towards user-defined goals.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 19
    ALEPH-w

    ALEPH-w

    Data structures and Algorithms library

    ...Network Flow (maximum and min cost), cut points, topological sort, spanning trees, min paths. etc. The graphs are generic in the sense that they can contain data independent of the algorithm. Several containers of the C++ STL library are implemented with Aleph-w. Their performance is better than GNU implementation
    Downloads: 2 This Week
    Last Update:
    See Project
  • 20

    Recursive Directory Removal

    Recursive Directory Removal

    https://github.com/mhisoft/rdpro
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Advanced Onion Router
    Advanced Onion Router is a portable client for the OR network and is intended to be an improved alternative for Tor+Vidalia+Privoxy bundle for Windows users. Some of the improvements include UNICODE paths, support for HTTP and HTTPS proxy protocols on the same Socks4/Socks5 port with HTTP header filtering that generates fake identity-dependent headers every time the identity is changed (proxy chains are also supported), support for NTLM proxies, a User Interface that makes Tor's options and...
    Leader badge
    Downloads: 180 This Week
    Last Update:
    See Project
  • 22

    The Encode

    Encode your text files

    This software is intended to encode your text files efficiently. You can decode them later using the same algorithm you used to encode it. Encode is professionalism packed simply and freely. You can use Encode for any non-illegal purposes. You can make any number of copies and redistribute Encode as it is.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 23
    MicroZip

    MicroZip

    Create,extract and encrypt ZIP,GZIP,TAR,BZIP2,TAZ files on Java mobile

    ...MicroZip allows you to extract selected files without extracting the whole ZIP archive. MicroZip also supports encrypted ZIP archives with both classic ZIP encryption and AES 256 encryption algorithm.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 24
    Visualization of Protein-Ligand Graphs

    Visualization of Protein-Ligand Graphs

    Compute protein graphs. Moved to https://github.com/MolBIFFM/PTGLtools

    ...The Visualization of Protein-Ligand Graphs (VPLG) software package computes and visualizes protein graphs. It works on the super-secondary structure level and uses the atom coordinates from PDB files and the SSE assignments of the DSSP algorithm. VPLG is command line software. If you do not like typing commands, try our PTGL web server: http://ptgl.uni-frankfurt.de/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Graphplan Implementations
    This project consists of various implementations of the Graphplan algorithm. At the moment we have two implementations of Graphplan: * Emplan - A C++ implementation for Linux, Windows and MacOS X * JavaGP - A Java implementation
    Downloads: 1 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • Next