Filtro

Minhas pesquisas recentes
Filtrar por:
Orçamento
para
para
para
Tipo
Habilidades
Idiomas
    Estado do Trabalho
    471 xor trabalhos encontrados, preços em USD

    um ofuscador de código javascript feito em php.. alguém pode me ajudar a entender como esse cara fez pra encriptar? toda vez que é gerado o código ofuscado ele gera diferente do anterior mesmo o código sendo o mesmo meu site esta sofrendo com crawlers, estão acessando o meu site e roubando informações pelo html.. com o método packer (pa.... com o método packer (packed) é fácil reconhecer um padrão e capturar oque quiser: porem com o método desse site deixa tudo escondido: , assim dificultando a vida desses crawlers entendeu ? pois se você reparar ele sempre gera um código diferente mesmo com a mesma entrada de js .. tava estudando e percebi que é um método em ...

    $165 (Avg Bid)
    $165 Média
    3 ofertas
    PapidForm XOR Encerrado left

    Modelagem de stl digitalizados para Solido através do RapidForm Disposto a dar curso

    $88 (Avg Bid)
    $88 Média
    1 ofertas

    I'm in need of a freelancer who has intermediate expertise in C++ and is knowledgeable about the XOR operator. The primary goal of this project is algorithm optimization. Key requirements: - Intermediate level expertise in C++ - Proficiency with the XOR operator - Experience in algorithm optimization Please submit your proposal if you have the required skills and experience.

    $28 (Avg Bid)
    $28 Média
    27 ofertas

    Circuits to be laid out : 1. An INVERTER Use: (W/L)n = 1.0/0.045 and (W/L)p = 2.0/0.045 2. A 2-input NAND gate Use: (W/L)n = 2.0/0.045 and (W/L)p = 2.0/0.045 3. A 2-input NOR gate Use: (W/L)n = 1.0/0.045 and (W/L)p = 4.0/0.045 4. A 2-input XOR gate Use: (W/L)n = 2.0/0.045 and (W/L)p = 4.0/0.045 5. A complex gate F = (A+B)•(C+D) Use: (W/L)n = 2.0/0.045 and (W/L)p = 4.0/0.045 All circuits are to be laid out using Cadence Virtuoso.

    $18 (Avg Bid)
    $18 Média
    1 ofertas

    I am looking for a skilled freelancer to help me with my project. The project involves designing an ALU, implementing RAM memory, and creating a pipelined datapath. Functionality of the ALU: - Basic arithmetic operations (addition, subtraction, multiplication, division) - Logical operations (AND, OR, XOR) Type of memory: - RAM Preferred architecture for the datapath: - Pipelined Ideal skills and experience for the job: - Strong knowledge of digital logic design and computer architecture - Experience with designing and implementing ALUs, RAM memory, and pipelined datapaths

    $160 (Avg Bid)
    $160 Média
    14 ofertas

    I am seeking a skilled engineer to design a multiplexer and develop a novel XOR gate for a specific application. The successful candidate will need to have expertise in digital circuit design and using QCA designer tool. The job entails the following tasks: - Designing a multiplexer with specified specifications - Developing a novel XOR gate utilizing innovative techniques - Knowledge of QCA designer tool - Conducting functional and performance testing Skills required: - Digital circuit design - Knowledge of multiplexers and XOR gates - Experience in functional and performance testing

    $54 (Avg Bid)
    $54 Média
    1 ofertas

    You should be able to layout some basic CMOS logic gates. This requires familiarity with Cadence Virtuoso tool . It includes some widely used basic CMOS logic gates. The circuits to be laid out are describe...some basic CMOS logic gates. This requires familiarity with Cadence Virtuoso tool . It includes some widely used basic CMOS logic gates. The circuits to be laid out are described below 1. An INVERTER Use: (W/L)n = 1.0/0.045 and (W/L)p = 2.0/0.045 2. A 2-input NAND gate Use: (W/L)n = 2.0/0.045 and (W/L)p = 2.0/0.045 3. A 2-input NOR gate Use: (W/L)n = 1.0/0.045 and (W/L)p = 4.0/0.045 4. A 2-input XOR gate Use: (W/L)n = 2.0/0.045 and (W/L)p = 4.0/0.045 5. A complex gate F = (A+B)•(C+D) Use: (W/L)n = 2.0/0.045 and (W/L)p = 4.0/0.045 All circuits are to be laid out using Cade...

    $153 (Avg Bid)
    $153 Média
    3 ofertas

    You whould be able to layout some basic CMOS logic gates. This requires familiarity with Cadence Virtuoso tool . It includes some widely used basic CMOS logic gates. The circuits to be laid out are describe...some basic CMOS logic gates. This requires familiarity with Cadence Virtuoso tool . It includes some widely used basic CMOS logic gates. The circuits to be laid out are described below 1. An INVERTER Use: (W/L)n = 1.0/0.045 and (W/L)p = 2.0/0.045 2. A 2-input NAND gate Use: (W/L)n = 2.0/0.045 and (W/L)p = 2.0/0.045 3. A 2-input NOR gate Use: (W/L)n = 1.0/0.045 and (W/L)p = 4.0/0.045 4. A 2-input XOR gate Use: (W/L)n = 2.0/0.045 and (W/L)p = 4.0/0.045 5. A complex gate F = (A+B)•(C+D) Use: (W/L)n = 2.0/0.045 and (W/L)p = 4.0/0.045 All circuits are to be laid out using Cade...

    $102 (Avg Bid)
    $102 Média
    5 ofertas

    I am looking for a skilled C++ developer to modify an existing c++ code, that currently uses XOR encryption algoritm for a function to encrypt pictures and text after compiling the exe. The decrypt key is written is currently written in the buffer. The exe needs to be able to decrypt the data when needed. Overall, I am seeking a developer who is knowledgeable in C++ and encryption algorithms, particularly AES. Experience with code modification and providing technical advice is highly desired.

    $451 (Avg Bid)
    $451 Média
    21 ofertas

    ...fast compact coding is critical. Recursion might simplify the coding. Be aware that worst case ANF can expand to 2^N terms. A lower state management scheme is likely to be more successful and faster, than calling frames and stack allocation. It would be useful to use switch/case to parse the compressed tree stream, and avoid if/elseif/elseif/else ANF is Algebraic Normal Form ... a special AND/XOR boolean algebra form. See the wikipedia description. the anfct.c file has one omission, and that is if the first character of a CT stream is '~' the expression is in complement form, IE is "1 ^ ctexpression", such that the string "AnBnCn~12132333n" represents "1 ^ A&C ^ A&B ^ A&B&C" and the string "A[3]n~12132333n&quo...

    $127 (Avg Bid)
    $127 Média
    29 ofertas

    I am hoping find the solution for UDT binary files with xor and from vb6 that will work with vb.net I have prepared a project that has some vb6 code to be converted with a run of batching file data

    $74 (Avg Bid)
    $74 Média
    17 ofertas
    c++ programmer -- 6 Encerrado left

    - Hidden String XOR -Hidden all Text in .DLL

    $66 (Avg Bid)
    $66 Média
    19 ofertas

    Hello, I am looking for someone to help me fix the source code of my Polymorphic Crypter that I have created. The source code of the stub is completely finished, I'm looking for someone who can help me to fix this one which continues to be detected by some antiviruses. The stub is coded in C++, the encryption algorithm used is XOR. I am looking for someone who is knowledgeable, able to help me rewrite my source code and change the problems it has. The purpose of the crypter is to encrypt an .exe file (any type of .net/native file 64/32bits etc) so that it cannot be detected by antivirus software (scantime/runtime). I am looking for someone who has done similar projects, if someone with good knowledge sends me a message and is sure of him we can arrange the price. Please co...

    $482 (Avg Bid)
    $482 Média
    22 ofertas

    Hello, I am looking for someone to help me fix the source code of my Polymorphic Crypter that I have created. The source code of the stub is completely finished, I'm looking for someone who can help me to fix this one which continues to be detected by some antiviruses. The stub is coded in C++, the encryption algorithm used is XOR. I am looking for someone who is knowledgeable, able to help me rewrite my source code and change the problems it has. Please contact me if you think you can. I will give more information in private, thank you.

    $481 (Avg Bid)
    $481 Média
    11 ofertas

    create an algorithm with and, or, not , xor plus pseudocode and flow chart and create a code for python with byte and decimal

    $26 (Avg Bid)
    $26 Média
    11 ofertas

    XOR based source routing is a routing technique based on binary linear algebra rather than scanning of routing or forwarding table. The input and output interface is represented as a binary string , XORed together to get a router interface label such that during forwarding the input interface is XORed with the router interface to get the output interface. The task is to write a python code which takes the value of number of vertices of a graph as input, create a random graph with full mesh structure. Secondly take a source and a destination node as input, use shortest path algorithm to get a path and then forward the packet from source to destination with the XOR based source routing technique. Further explanations of XOR Based Source Routing is given in the journal be...

    $64 (Avg Bid)
    $64 Média
    2 ofertas

    XOR based source routing is a routing technique based on binary linear algebra rather than scanning of routing or forwarding table. The input and output interface is represented as a binary string , XORed together to get a router interface label such that during forwarding the input interface is XORed with the router interface to get the output interface. The task is to write a python code which takes the value of number of vertices of a graph as input, create a random graph with full mesh structure. Secondly take a source and a destination node as input, use shortest path algorithm to get a path and then forward the packet from source to destination with the XOR based source routing technique. Further explanations of XOR Based Source Routing is given in the journal b...

    $24 (Avg Bid)
    $24 Média
    1 ofertas

    ...is encoded as a path ID and all such paths are advertised from a particular source to a particular destination. We want to explore two scenarios, in the first one, a path is being randomly encoded and in the second one the path is being encoded using XOR based source routing technique(further details are enclosed in the files attached). The problems faced in Preferred Path Routing is the number of paths from a source to a destination is a non deterministic polynomial, and hence forwarding table becomes too large. To overcome this problem, XOR based encoding is used to create a path label. In the process of creation of a path label, for each node, the interface label is created by XORing the input interface ID with the output interface ID, such that one can be retrieved by ...

    $31 - $61
    $31 - $61
    0 ofertas

    ...is encoded as a path ID and all such paths are advertised from a particular source to a particular destination. We want to explore two scenarios, in the first one, a path is being randomly encoded and in the second one the path is being encoded using XOR based source routing technique(further details are enclosed in the files attached). The problems faced in Preferred Path Routing is the number of paths from a source to a destination is a non deterministic polynomial, and hence forwarding table becomes too large. To overcome this problem, XOR based encoding is used to create a path label. In the process of creation of a path label, for each node, the interface label is created by XORing the input interface ID with the output interface ID, such that one can be retrieved by ...

    $25 - $49
    $25 - $49
    0 ofertas

    Here is 1 link I need to pass. I want to use anti**** service to solve re**** v2 then get px3 value of this site. here is the link: I...here is the link: I wish it was made from php. or curl if possible. I tried decrypting the payload string after decoding the re*** on my server but failed. i used base64 and xor 32 but i only solved the other half that was encrypted. Please help me as quickly as possible. thank!

    $250 (Avg Bid)
    $250 Média
    11 ofertas

    ...is encoded as a path ID and all such paths are advertised from a particular source to a particular destination. We want to explore two scenarios, in the first one, a path is being randomly encoded and in the second one the path is being encoded using XOR based source routing technique(further details are enclosed in the files attached). The problems faced in Preferred Path Routing is the number of paths from a source to a destination is a non deterministic polynomial, and hence forwarding table becomes too large. To overcome this problem, XOR based encoding is used to create a path label. In the process of creation of a path label, for each node, the interface label is created by XORing the input interface ID with the output interface ID, such that one can be retrieved by ...

    $25 - $49
    $25 - $49
    0 ofertas

    Cicada-69420 This event is based on a combination of riddles, cryptography, and technical skills. Individually, or in teams, you must interpret the information that we have provided you with, in order to solve the challenge. It will be apparent when this is done. This image is all that you need, however, clues will be progressively released. Clue ...based on a combination of riddles, cryptography, and technical skills. Individually, or in teams, you must interpret the information that we have provided you with, in order to solve the challenge. It will be apparent when this is done. This image is all that you need, however, clues will be progressively released. Clue 1) First password is ‘zain’ Clue 2) No capitals are used Clue 3) Rot13 Base64 XOR Clue 4) You do not n...

    $50 (Avg Bid)
    Garantido
    $50
    5 inscrições

    Cicada-69420 This event is based on a combination of riddles, cryptography, and technical skills. Individually, or in teams, you must interpret the information that we have provided you with, in order to solve the challenge. It will be apparent when this is done. This image is all that you need, however, clues will be progressively released. Clue 1) ...on a combination of riddles, cryptography, and technical skills. Individually, or in teams, you must interpret the information that we have provided you with, in order to solve the challenge. It will be apparent when this is done. This image is all that you need, however, clues will be progressively released. Clue 1) First password is ‘zain’ Clue 2) No capitals are used Clue 3) Rot13 Base64 XOR Clue 4) You do not ne...

    $250 (Avg Bid)
    $250 Média
    1 ofertas
    algorithm Encerrado left

    • The algorithm for adding two integers must be based on the use of standard logical operations which have direct hardware implementation (AND, OR, XOR, NOT)

    $12 - $24
    Secreto
    $12 - $24
    4 ofertas

    I need to perform XOR of an array with 100k arrays. The size of each array is 10k. Also, I need to do the other way round. I need to even monitor the GPU times i.e computation and transfer time and show it"s faster then CPU I have also asked on stack overflow " "

    $7 - $18
    $7 - $18
    0 ofertas

    XOR multiple ciphertexts to decrypt ciphertexts. Please refer to pdf for full instructions.

    $10 (Avg Bid)
    $10 Média
    2 ofertas

    I would like someone who can perform a handshake with a websocket for a multiplayer game. The task is to be able to log-in the game and perform an action. Though, the messages between the client and the websocket are XOR encrypted which makes it a more of a difficult job. Please contact me for more details

    $25 (Avg Bid)
    $25 Média
    1 ofertas

    ...signature but the main logic within this function should be inline assembly code using the ASM block similar to the assembly example in the Program Specification: long mult ( long op1, long op2 ) Can’t use the MUL/IMUL instructions, meaning you use ADD repeatedly If there are overflow, return the overflowed values in RAX register long XOR ( long op1, long op2 ) xor will return the result of bit exclusive OR of op1 / op2 can use XOR instruction long rotate ( long op1, long direction, long number_of_bits ) rotate will perform logical bit-rotation of input operand (op1) direction = 0 for left and 1 for right number_of_bits will dictate how many bits to rotate left or right you need to use rcl and rcr assembly instructions long factorial ( long op1 ) Input ...

    $121 (Avg Bid)
    $121 Média
    5 ofertas

    Hata yapmak her insanın doğal bir özelliğidir. Dosyalarınızı şifreledikten sonra hata yaparsanız tekrar onlara ihtiyacınız olduğunda ortada kalmamanız için sizlere böyle bir hizmet sunmaktayım. Ioncube ile şifrelenmiş php dosyalarınızı çözerek mağduriyetinizi hızlı bir şekilde gideririm. Basic PHP Decoder 6€ for each File IonCube - PHP 5.3/5.4/5.5/5.6 SourceCop - PH...Javascript & Python Decoder 7€ for each File eval(function(p,a,c,k,e,d){e=function(c) var enkripsi javascript files (unescape & var hex Python Unmarshal Decoder love = 'x6fx61x44x74' god = 'x4ax32x78x76' Lua Decoder €11 LuaQ - LuaS Revo All Version azael - IronBrew2 GameGuardian Lua Luraph Obfuscator loadstring Lua bytecode - Lua Hex ... Lua Obfuscator ...

    PHP
    $469 (Avg Bid)
    $469 Média
    9 ofertas
    Project for Aqeel A. Encerrado left

    2. Implement 2-bus processor with a hardwired control unit: The processor has the following characteristics. • Instructions: Add, Or, Sub, Ori, Xor, Ld, St, La, Br, Brnz, Stop, Shl. • Data bus is 32 bits. • Address bus is 16 bits. • 24 general purpose registers. • Shift instruction should be executed within one clock cycle. i need the VHDL code using Quartus prime Note if its late we will not pay

    $50 (Avg Bid)
    $50 Média
    1 ofertas
    assigment VHDL Encerrado left

    2. Implement 2-bus processor with a hardwired control unit: The processor has the following characteristics. • Instructions: Add, Or, Sub, Ori, Xor, Ld, St, La, Br, Brnz, Stop, Shl. • Data bus is 32 bits. • Address bus is 16 bits. • 24 general purpose registers. • Shift instruction should be executed within one clock cycle. in VHDL code using quartes prime

    $158 (Avg Bid)
    $158 Média
    12 ofertas
    assigment VHDL -- 2 Encerrado left

    1. Implement 2-bus processor with a hardwired control unit: The processor has the following characteristics. • Instructions: Add, Or, Sub, Ori, Xor, Ld, St, La, Br, Brnz, Stop, Shl. • Data bus is 32 bits. • Address bus is 16 bits. • 24 general purpose registers. • Shift instruction should be executed within one clock cycle.

    $123 (Avg Bid)
    $123 Média
    3 ofertas

    Dr Watson is worried that a 56 bit key is not long enough, so he has invented a new combination of DES with a one-time...to decrypt P?” “Ah, that’s the clever bit” says Watson modestly. “The government then encrypts the pad R under a second shared DES key k2, and sends that to the embassy as well. The attacker will need to guess both k1 and k2 correctly to decipher P, and that’s 112 bits! Not only that, but the one-time pad really is unbreakable, so the ambassador can keep on using the same k1 and k2. “ GàE: E"#(P XOR R), E",(R) “Oh dear, says Holms sadly, “I think Moriarty would have no more difficulty with your system than he would with ordinary DES. Embassy messages are very formal, and we must assume that Mo...

    $122 (Avg Bid)
    $122 Média
    1 ofertas

    Dr Watson is worried that a 56 bit key is not long enough, so he has invented a new combination of DES with a one-time...to decrypt P?” “Ah, that’s the clever bit” says Watson modestly. “The government then encrypts the pad R under a second shared DES key k2, and sends that to the embassy as well. The attacker will need to guess both k1 and k2 correctly to decipher P, and that’s 112 bits! Not only that, but the one-time pad really is unbreakable, so the ambassador can keep on using the same k1 and k2. “ GàE: E"#(P XOR R), E",(R) “Oh dear, says Holms sadly, “I think Moriarty would have no more difficulty with your system than he would with ordinary DES. Embassy messages are very formal, and we must assume that Mo...

    $119 (Avg Bid)
    $119 Média
    2 ofertas

    Dr Watson is worried that a 56 bit key is not long enough, so he has invented a new combination of DES with a one-time...to decrypt P?” “Ah, that’s the clever bit” says Watson modestly. “The government then encrypts the pad R under a second shared DES key k2, and sends that to the embassy as well. The attacker will need to guess both k1 and k2 correctly to decipher P, and that’s 112 bits! Not only that, but the one-time pad really is unbreakable, so the ambassador can keep on using the same k1 and k2. “ GàE: E"#(P XOR R), E",(R) “Oh dear, says Holms sadly, “I think Moriarty would have no more difficulty with your system than he would with ordinary DES. Embassy messages are very formal, and we must assume that Mo...

    $85 (Avg Bid)
    $85 Média
    1 ofertas

    Dr Watson is worried that a 56 bit key is not long enough, so he has invented a new combination of DES with a one-time...to decrypt P?” “Ah, that’s the clever bit” says Watson modestly. “The government then encrypts the pad R under a second shared DES key k2, and sends that to the embassy as well. The attacker will need to guess both k1 and k2 correctly to decipher P, and that’s 112 bits! Not only that, but the one-time pad really is unbreakable, so the ambassador can keep on using the same k1 and k2. “ GàE: E"#(P XOR R), E",(R) “Oh dear, says Holms sadly, “I think Moriarty would have no more difficulty with your system than he would with ordinary DES. Embassy messages are very formal, and we must assume that Mo...

    $68 (Avg Bid)
    $68 Média
    1 ofertas

    ...C: How to Declare Variable, Initialize, Print, Example 11. Storage Classes in C: auto, extern, static, register class in C 12. C Files I/O: Create, Open, Read, Write and Close a File 13. Functions in C Programming with Examples: Recursive, Inline 14. Pointers in C Programming: What is Pointer, Types & Examples 15. Functions Pointers in C Programming with Examples 16. C Bitwise Operators: AND, OR, XOR, Shift & Complement (with Example) 17. C Dynamic Memory Allocation using malloc(), calloc(), realloc(), free() 18. TypeCasting in C: Implicit, Explicit with Example 19. Powershell Tutorial for Beginners: Learn in 1 Day 20. Difference between Structure and Union 21. C++ Vs. C# - What’s the Difference? 22. Difference Between C and C++ 23. Difference between C and Java 24....

    $179 (Avg Bid)
    $179 Média
    11 ofertas

    Demo project that has 2 routes. I route is the incoming reference data that is popped into a sorted array held in ram. Other route is the number we are searching using a binary search tree. We are simply creating a large data buffer of numbers that will be searched Route 1 - Accept t...do mysql later) 2 - If there is not match, permute 1 bit at a time and search the library again. - flip bit 1, search, undo, flip bit 2, search undo, ..... flip bit 64, search undo 3 - If there is no match with 1 bit in error move to 2 bits in error - flip bit 1 and bit 2, search, undo bit 2, flip bit 3 search, undo bit 3, ....... (this could be a nest loop) - flipping bits is done via xor function. XOR(2^bit,num) where bit is from 0-63 Nodejs lib exists for circular buffer, bindery se...

    $74 (Avg Bid)
    $74 Média
    2 ofertas

    The application I need is a virtual print driver that gets the printer's out and save it to a PDF file with Random Unique File Name. (eg: Timestamp) and should save automatically. I might be able to rebuild it in Microsoft Visual Studio 2015 (and later) in C# XOR C++. Printed PDF File should be Same as Microsoft PRINT 2 PDF Output. I want to use a virtual printer with my own brand. You can use external PDF solution if in its licence I can make commercial use in final application. But I must be able to install the application and all its dependencies in one single setup process, in order to distribute the MSI or setup executable without any assistance. So any required library must be shipped with solution developed. Additionally, the application must have the follo...

    $717 (Avg Bid)
    $717 Média
    5 ofertas

    ...24 6C 97 20 9C 91 97 2F F6 66 77 D7 50 4B C1 41 AB D5 79 9F 66 1A 52 2C AC 81 69 5E 62 DA 94 62 (that's the valid result by the way, you can use this example to test your script) Be careful, these are hexadecimal characters but the value is represented each time by two digits (16*16=base 256). I added space to better understand the logic behind it. A few tips : 1) sum is "add" operation, not "xor" operation. 3) hex dump is not sequence of hex digits. It's sequence of bytes (two digits per byte): 85A9 doesn't mean 8 5 A 9. it means 85 A9. 3) the order is reverse: "least significant" byte is first. The final goal is to reproduce what the 7zip tool does with its CRC-SHA256 feature but in PHP... So we would get the exact same result, ...

    PHP
    $179 (Avg Bid)
    $179 Média
    3 ofertas

    The calculator should support T, F, not, and, nand, or, xor, nor, then, equiv and brackets, error detection.

    $23 (Avg Bid)
    $23 Média
    23 ofertas

    ...given as 0.35 and 0.45 2. Learning coefficient is 0.9 3. Threshold value is 5.5 (2). Simulate NOR operation. There are two input units and one output unit. Input patterns are (0, 0), (0, 1), (1, 0), and (1, 1). The output will be either 1 or 0. The given parameters are as follows; 1. Initial weights are given as 0.9 and 0.5 2. Learning coefficient is 0.8 3. Threshold value is -1.5 (3). Simulate XOR (exclusive or) operation. There are two input units and one output unit. Input patterns are (0, 0), (0, 1), (1, 0), and (1, 1). The output will be either 1 or 0. The given parameters are as follows; 1. Initial weights are given as 0.5 and 0.2 2. Learning coefficient is 0.7 3. Threshold value is 2 Submit the following files through Western Online. • source code file • source c...

    $22 (Avg Bid)
    $22 Média
    2 ofertas

    The 4-bit array multiplier and baugh wooley multiplier which one is good multiplier and low power consumption l compare the parameter analysis like delay,area,power then design a vlsi physical design like import,floorplaning, placement,clock tree synthesis ,routing ,and finally implemented nexys4ddr board implemented.

    $153 - $460
    $153 - $460
    0 ofertas

    Need to build custom openvpn to make ti work in stealth mode. The VPN Traffic should be able to overcome dpi used by ISPs to block VPN. The packet length should be variable and not static. Tunneblick xor patch has already been tried and its getting blocked. So we need a custom patch that can make the openvpn traffic with variable packet length.

    $49 / hr (Avg Bid)
    $49 / hr Média
    7 ofertas

    Hi Abhishek G., I noticed your profile and would like to ask if you're able to decrypt compiled lua files, we assume they are compiled with XOR encryption. We can discuss any details over chat.

    $8 / hr (Avg Bid)
    $8 / hr Média
    1 ofertas

    ...default) while True: (question + prompt) choice = raw_input().lower() if default is not None and choice == '': return valid[default] elif choice in valid: return valid[choice] else: ("Please respond with 'yes' or 'no' " "(or 'y' or 'n').n") def xor(data, key): return bytearray(a^b for a, b in zip(*map(bytearray, [data, key]))) def str_xor(s1, s2): return "".join([chr(ord(c1) ^ ord(c2)) for (c1,c2) in zip(s1,s2)]) def ed(data, key): resultStr = "" for c in data: dc = ord(c) newD = dc for a in key: new...

    $36 (Avg Bid)
    $36
    6 inscrições

    F: A string which is an S-expression of a ZOL formula. You can assume: The operators used are IF,IFF,AND,OR,XOR,and NOT. The NOT operator has one argument, a wff The IF, IFF,and XOR operators have two wffs as arguments The special = predicate takes two objects as arguments (= is in prefix form, not infix) The AND and OR operators have two or more arguments All predicates have zero or more arguments All functions will have zero or more arguments All predicate, function, and object symbols will be alphanumberic strings All formulae are well-formed Symbols may be overloaded---type is determined through position Returns a list [S, P, O, Fn] where: S is a string telling us whether F was satisfiable: “T” – If the formula is a tautology, “S” – I...

    $60 (Avg Bid)
    $60 Média
    1 ofertas