Skip to content
View D3vRandom's full-sized avatar
Block or Report

Block or report D3vRandom

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Popular repositories

  1. Zero-Knowledge-Proof-Identity-Verification Zero-Knowledge-Proof-Identity-Verification Public

    A Hash-less Adaptation of Schnorr's Digital Signature Algorithm Implemented in Python.

    HTML 8 3

  2. Merkle-Hellman-Knapsack-Cipher Merkle-Hellman-Knapsack-Cipher Public

    A Python Implemented Cryptographic Algorithm Which Utilizes Public, Private Key Cryptography to Provide Congruent Super-Increasing Sets for Encryption of Data. This Algorithm relies on the SUBSET-S…

    Python 2 1

  3. Shor-s-Factoring-Algorithm Shor-s-Factoring-Algorithm Public

    This is a python implemented factoring algorithm, that can be executed in polynomial time on a quantum computer such that it has sufficient Qbits and accuracy.

    Python 1

  4. Min-Window-Substring Min-Window-Substring Public

    This is my solution written in Python to the Min Window Substring. My people get this as a coding interview question, like I did. I though I'd share my version of the code to maybe help someone out…

    Python 1

  5. Malware-Reports Malware-Reports Public

    I couldn't find many samples of completed Malware reports online, so I decided that I'd make my own. This is a soon to be full list of Malware reports that I complete. Hope this helps you make a te…

  6. Dr-Eggs Dr-Eggs Public

    Forked from insecurityofthings/jackit

    JackIt - Exploit Code for Mousejack

    Python