Popular repositories Loading
-
Zero-Knowledge-Proof-Identity-Verification
Zero-Knowledge-Proof-Identity-Verification PublicA Hash-less Adaptation of Schnorr's Digital Signature Algorithm Implemented in Python.
-
Merkle-Hellman-Knapsack-Cipher
Merkle-Hellman-Knapsack-Cipher PublicA Python Implemented Cryptographic Algorithm Which Utilizes Public, Private Key Cryptography to Provide Congruent Super-Increasing Sets for Encryption of Data. This Algorithm relies on the SUBSET-S…
-
Shor-s-Factoring-Algorithm
Shor-s-Factoring-Algorithm PublicThis is a python implemented factoring algorithm, that can be executed in polynomial time on a quantum computer such that it has sufficient Qbits and accuracy.
Python 2
-
Min-Window-Substring
Min-Window-Substring PublicThis is my solution written in Python to the Min Window Substring. My people get this as a coding interview question, like I did. I though I'd share my version of the code to maybe help someone out…
Python 1
-
Malware-Reports
Malware-Reports PublicI couldn't find many samples of completed Malware reports online, so I decided that I'd make my own. This is a soon to be full list of Malware reports that I complete. Hope this helps you make a te…
-
Dr-Eggs
Dr-Eggs PublicForked from insecurityofthings/jackit
JackIt - Exploit Code for Mousejack
Python
0 contributions in the last year
Day of Week | May May | June Jun | July Jul | August Aug | September Sep | October Oct | November Nov | December Dec | January Jan | February Feb | March Mar | April Apr | |||||||||||||||||||||||||||||||||||||||||
Sunday Sun | |||||||||||||||||||||||||||||||||||||||||||||||||||||
Monday Mon | |||||||||||||||||||||||||||||||||||||||||||||||||||||
Tuesday Tue | |||||||||||||||||||||||||||||||||||||||||||||||||||||
Wednesday Wed | |||||||||||||||||||||||||||||||||||||||||||||||||||||
Thursday Thu | |||||||||||||||||||||||||||||||||||||||||||||||||||||
Friday Fri | |||||||||||||||||||||||||||||||||||||||||||||||||||||
Saturday Sat |