Repository of algorithms implemented in pure assembly
☆286Jun 12, 2024Updated last year
Alternatives and similar repositories for Assembly-Algorithms
Users that are interested in Assembly-Algorithms are comparing it to the libraries listed below
Sorting:
- Smali reference for reverse engineering Dalvik Bytecode☆41Sep 6, 2023Updated 2 years ago
- .wav files of various oscilliscope graphics tests☆16Aug 7, 2023Updated 2 years ago
- This repo contains the APK to follow along with my "Beautifying Android Native Code" Video on Youtube☆13May 31, 2023Updated 2 years ago
- Docker container for quickly analyzing Linux malware☆86Aug 20, 2023Updated 2 years ago
- This contains notes and code for my Troopers23 Beyond Java talk☆24Jun 30, 2023Updated 2 years ago
- This contains notes, slides, and code for my Strange Loop talk☆31Sep 22, 2023Updated 2 years ago
- This contains notes and slides for my talk on Reverse Engineering Android Malware☆64Feb 6, 2026Updated 3 weeks ago
- This contains notes, slides, and code for my BsidesSeattle 2023 talk, Unmasking the Godfather☆12May 25, 2023Updated 2 years ago
- The iOS IPA file Reverse Engineering reference☆499Jan 29, 2024Updated 2 years ago
- ☆38Oct 24, 2023Updated 2 years ago
- This contains notes and slides for my REcon 2024 talk on Auto Unpacking Android Malware☆30Jun 29, 2024Updated last year
- Notes for my video on running an ARM64 Android emulator in Azure☆39Jul 19, 2024Updated last year
- Automated Android custom unpacker generator☆375Aug 23, 2025Updated 6 months ago
- The ARTful library for dynamically modifying the Android Runtime☆346Apr 6, 2024Updated last year
- Run the Medusa Android framework inside a docker container on x86 or ARM☆40Mar 19, 2023Updated 2 years ago
- ☆20Aug 12, 2023Updated 2 years ago
- A useful starting point for CFIs, students, and anyone hoping to learn more about aviation.☆15Feb 23, 2026Updated last week
- This is a guide to removing PDF watermarks. It contains the lessons learned from an experiment of mine.☆18Oct 11, 2024Updated last year
- ☆113Oct 1, 2024Updated last year
- Supporting code for exploiting the RISC-V GhostWrite vulnerability☆84Nov 22, 2024Updated last year
- Smali Source code interpreter + visitor API in Python3 and an emulator to execute code snippets.☆30May 23, 2025Updated 9 months ago
- A step-by-step walkthrough of the inner workings of a simple neural network. The goal is to demystify the calculations behind neural netw…☆29Nov 26, 2025Updated 3 months ago
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆14May 29, 2022Updated 3 years ago
- Sage Math recompiled to run on the Raspberry Pi☆15Oct 9, 2015Updated 10 years ago
- A GKI Android kernel driver(ARMv8.3) template compiled by llvm-msvc☆41May 17, 2024Updated last year
- Supporting code and apps for demonstrating Android interprocess communication☆43Aug 5, 2024Updated last year
- RISC8Emulator is a software recreation of the CHIP-8 system, a simple computer from the mid-1970s primarily used for playing video games☆13Feb 1, 2024Updated 2 years ago
- Cat and Dog Classification with Convolutional Neural Networks (CNNs)☆15Sep 23, 2023Updated 2 years ago
- GoAnime is a cli tool to browse and play anime in pt-br on konsole☆15Jan 29, 2024Updated 2 years ago
- GRAFHY is a virtual communication platform that enables users to exchange messages, posts, and images made with Python and Vue.js☆14Feb 1, 2024Updated 2 years ago
- ☆13Jan 24, 2024Updated 2 years ago
- simple pure-python tool to parse mmdb files and convert them to the old format Tor uses☆10Nov 25, 2017Updated 8 years ago
- 📱 RUNIC tamper detection demo - designed to serve as a parallel for understanding more complex tamper detection and integrity systems su…☆15Apr 13, 2024Updated last year
- Python-built Multilayer Perceptron, a personal project utilizing Keras-TensorFlow for advanced artificial neural network modeling☆16Nov 20, 2023Updated 2 years ago
- Monitor and Control how Android Apps access your local storage. A great tool to investigate what files your apps put their eyes on.☆10Feb 5, 2024Updated 2 years ago
- Flutter mobile application with a Go backend, specialized in robust user authentication☆15Jan 24, 2024Updated 2 years ago
- Gesture-controlled computer interactions using hand tracking☆13May 8, 2024Updated last year
- ☆16Feb 23, 2025Updated last year
- ARC4 (Alleged RC4) cryptography provider class library.☆10Dec 15, 2024Updated last year