nccgroup / manim-cranim
Toolkit for creating cryptographic figures and videos.
☆31Updated 9 months ago
Alternatives and similar repositories for manim-cranim:
Users that are interested in manim-cranim are comparing it to the libraries listed below
- ☆28Updated last month
- examples of using radius2 to solve reversing challenges☆34Updated 2 months ago
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆43Updated 9 months ago
- Open Source eBPF Malware Analysis Framework☆47Updated 4 months ago
- BINARLY Research Tools and PoCs☆35Updated 5 months ago
- A command line tool for extracting machine learning ready data from software binaries powered by Radare2☆62Updated 3 months ago
- Automated vulnerability discovery and annotation☆65Updated 7 months ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆49Updated 2 months ago
- BinjaryNinja plugin for a ShellStorm like assembly/disassembly experience☆14Updated 3 months ago
- ☆74Updated 8 months ago
- A Completely Modular LLM Reverse Engineering, Red Teaming, and Vulnerability Research Framework.☆46Updated 3 months ago
- A MBR Fuzzer☆28Updated 11 months ago
- bootloaders.io is a curated list of known malicious bootloaders for various operating systems. The project aims to assist security profes…☆51Updated last year
- TrustZone Trusted Application 0-Days by Design☆18Updated 4 months ago
- Binary code coverage visualizer plugin for Ghidra - just without crashes on unknown insns☆19Updated 4 months ago
- CellGuard is a research project that analyzes how cellular networks are operated and possibly surveilled☆107Updated 2 months ago
- Diaphora Machine Learning tools and datasets☆19Updated 5 months ago
- A tool to perform so called BGE attack☆24Updated 10 months ago
- ☆77Updated 8 months ago
- A tool for generating detailed, locally-processed reports from iOS backups, supporting encrypted and unencrypted data.☆49Updated 4 months ago
- Repository for the Framing Frames publication: security context and transmit queue manipulations, client isolation bypasses, and more.☆47Updated last year
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆35Updated 2 months ago
- ☆59Updated this week
- ☆16Updated 9 months ago
- Hardened your Windows OS against forensics analysis☆20Updated 3 months ago
- Research tools developed for Intel Wi-Fi chips☆51Updated last year
- ☆136Updated 6 months ago
- In this Arsenal lab session, we will extract firmware from an EV charger, dig into the firmware, and eventually emulate it so we can inte…☆47Updated last year