Giter Club home page Giter Club logo

qq431169079's Projects

concurrent-queue- icon concurrent-queue-

用posix的多线程和自旋锁根据http://www.cs.rochester.edu/research/synchronization/pseudocode/queues.html#tlq 算法实现了一个Two-Lock Concurrent Queue。 同时根据用C语言实现了CAS锁根据Non-Blocking Concurrent Queue Algorithm算法实现了 一个非阻塞的并发队列。

cookie-split icon cookie-split

Given an http Set-Cookie header, this will split the header into individual header strings. It takes into consideration various implementations including embedded commas.

cportscanner icon cportscanner

scans udp and tcp protocols very quickly using threading

cproxy-1 icon cproxy-1

基于C的Epoll实现的简单http代理服务器

cpuhunter icon cpuhunter

💻Convert any pc to money making machine. 💰

crab icon crab

一个内网穿透工具,仅需要公网服务器开放一个端口就可以支撑多个用户同时穿透多个端口

crabproxy icon crabproxy

一个支持端口转发和端口复用的小型服务端(旧版)

crack_ssh icon crack_ssh

go写的协程版的ssh\redis\mongodb弱口令破解工具

cramfs icon cramfs

经过修改,容错能力更好的cramfs-tools

cramfs-1 icon cramfs-1

Fork of cramfs-1.1 with a patch for suppressing errors when unpacking faulty filesystems.

cripple icon cripple

stun server, just need single public IP address

crowbar icon crowbar

Crowbar is brute forcing tool that can be used during penetration tests. It is developed to support protocols that are not currently supported by thc-hydra and other popular brute forcing tools.

crowbar-1 icon crowbar-1

Tunnel TCP over a plain HTTP session (warning: mediocre Go code)

cryptochain icon cryptochain

This is a simple Blockchain application which allow a node to join the network and create, sign, verify and broadcast transactions.Newly broadcasted transactions are then received by peer nodes in their local transaction pool and later verified and included in next block upon successful mining and the minor gets some reward for the same.At a point of time the longest and valid blockchain is accepted by all the peer nodes.The mining difficulty is dynamically adjusted frequently to ensure timely block creation and mitigate 51% attack on the blockchain network.Elliptic Curve secp256k1 algorithm is used to securely sign and independently verify a transaction and Sha256 hashing algorithm for mining purpose.This project was recognized by GitHub and shortlisted for GitHub Arctic Code Vault Archival program.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.