nccgroup / manim-cranimLinks
Toolkit for creating cryptographic figures and videos.
☆35Updated last year
Alternatives and similar repositories for manim-cranim
Users that are interested in manim-cranim are comparing it to the libraries listed below
Sorting:
- A command line tool for extracting machine learning ready data from software binaries powered by Radare2☆72Updated 7 months ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆52Updated 4 months ago
- ☆35Updated 10 months ago
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆43Updated last year
- C and Python training from our Vulnerability Researcher Development Program (VRDP)☆83Updated 4 months ago
- BINARLY Research Tools and PoCs☆39Updated last year
- examples of using radius2 to solve reversing challenges☆36Updated 11 months ago
- Proof-of-concept modular implant platform leveraging v8☆55Updated 9 months ago
- Security Blogs - A simple aggregator for security news/blog☆24Updated this week
- ThingFinder is a tool designed to facilitate searching and analysing code, whether it's source code or compiled binary executables. It pr…☆38Updated last year
- ☆20Updated last year
- A library and a set of tools for exploiting and communicating with Google's Quick Share devices.☆47Updated 8 months ago
- Binary Exploitation Phrack CTF Challenge☆138Updated 3 months ago
- ☆44Updated last year
- eBPF Memory Dump Tool☆92Updated 3 months ago
- details about DIAL protocol vulnerabilities☆30Updated 2 years ago
- Golem automates C/C++ vulnerability discovery with SemGrep+LLVM+LLM☆94Updated 5 months ago
- BinjaryNinja plugin for a ShellStorm like assembly/disassembly experience☆17Updated last year
- ☆130Updated 2 years ago
- Hardened your Windows OS against forensics analysis☆23Updated last year
- Automated vulnerability discovery and annotation☆67Updated last year
- Open Source eBPF Malware Analysis Framework☆53Updated last year
- Reverse engineering assistant that uses a locally running LLM to aid with pseudocode analysis.☆106Updated this week
- TrustZone Trusted Application 0-Days by Design☆25Updated 6 months ago
- Userland exec PoC to be used as attack vector technique☆94Updated last month
- Exfiltrate data over audio output from remote desktop sessions - Covert channel PoC☆63Updated last year
- ☆21Updated last week
- PoC code and tools for Black Hat USA 2024☆26Updated last year
- Slides and files for the Reversing Rust Binaries: One step beyond strings workshop at REcon 2024, presented on June 28, 2024.☆80Updated last year
- Binary Exploitation Phrack CTF Challenge☆70Updated 3 months ago