AkechiShiro / slides-talksLinks
My own cybersecurity research talks/slides
☆37Updated last year
Alternatives and similar repositories for slides-talks
Users that are interested in slides-talks are comparing it to the libraries listed below
Sorting:
- Nyxelf is a highly effective tool tailored for analyzing malicious Linux ELF binaries, offering comprehensive support for both static and…☆107Updated 5 months ago
- Simple demo illustrating remanence of data in RAM (see Cold boot attack) using a Raspberry Pi. Loads many images of the Mona Lisa into R…☆103Updated last year
- Battery info program for x86-64 Linux laptops in 384 bytes of machine code☆60Updated last year
- Lamport's Bakery Algorithm Demonstrated in Python☆96Updated last year
- Visualize binary files☆132Updated this week
- Examples of Linux Inter-Processing Communication☆35Updated 5 months ago
- Detecting Inconsistencies in Feature or Function Evaluations of Requirements☆67Updated last year
- LD_PRELOADable library for exploring the glibc heap☆107Updated 4 months ago
- Compiler for the Jill programming language (an alternative to Jack from the nand2tetris course)☆80Updated 4 months ago
- An introduction to temporal logic and how it can be used to analyze concurrency☆105Updated last year
- ANIL(A Nice Intermediate Language) Python & C++ inspired programming language that transpiles to C and can be embedded within C source fi…☆58Updated 2 months ago
- Emulador Genérico do Gabriel☆85Updated 3 weeks ago
- A small, portable, linear probing hash map☆143Updated 3 months ago
- Block Erasure Format - An extensible, fast, and usable file utility to encode and decode interleaved erasure coded streams of data.☆58Updated last year
- Tiny, rough-and-ready quantum circuit simulator for exploring quantum networking and computing.☆33Updated last year
- Set of macros that guard against buffer overflows. Based on C99 VLA feature.☆129Updated 2 years ago
- A JPEG Image Compression Service using Part Homomorphic Encryption.☆31Updated 4 months ago
- ☆44Updated 5 months ago
- A Ninja's Handbook: A book on privacy, security, and anonymity online.☆91Updated 10 months ago
- minimal yet working VPN daemon for Linux☆106Updated 2 months ago
- 🪝"mnist" in 60 lines of code, no dependencies. For educational purposes.☆31Updated last year
- Solving the first 100 Project Euler problems using 100 different programming languages!☆240Updated last month
- Little Kitten Webserver☆276Updated last year
- What impact does floating point precision have on Mandelbrot set calculations?☆108Updated 2 years ago
- Logo language in 508 bytes (x86 boot sector)☆177Updated last year
- Generate (message) sequence diagrams from TLA+ state traces☆75Updated 2 years ago
- Sequential Logic☆110Updated last week
- A x86_64 Linux debugger 🐛🐛🐛☆236Updated last year
- My investigation into mission generation in the Stealth Fighter games by Microprose.☆82Updated 6 months ago
- ☆36Updated 4 months ago