nccgroup / manim-cranimLinks
Toolkit for creating cryptographic figures and videos.
☆33Updated last year
Alternatives and similar repositories for manim-cranim
Users that are interested in manim-cranim are comparing it to the libraries listed below
Sorting:
- Proof-of-concept modular implant platform leveraging v8☆54Updated 5 months ago
- BINARLY Research Tools and PoCs☆36Updated 10 months ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆51Updated 3 weeks ago
- ☆28Updated 6 months ago
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆42Updated last year
- A command line tool for extracting machine learning ready data from software binaries powered by Radare2☆72Updated 3 months ago
- Userland exec PoC to be used as attack vector technique☆85Updated 6 months ago
- Open Source eBPF Malware Analysis Framework☆49Updated 10 months ago
- Still point in moving world.☆51Updated 2 years ago
- rpv-web is a browser based frontend for the rpv library☆26Updated 3 months ago
- This repository contains the pre-joining training materials given to aspiring researchers on the Vulnerability Researcher Development Pro…☆79Updated 3 weeks ago
- A library and a set of tools for exploiting and communicating with Google's Quick Share devices.☆45Updated 4 months ago
- ☆18Updated last year
- ThingFinder is a tool designed to facilitate searching and analysing code, whether it's source code or compiled binary executables. It pr…☆38Updated last year
- A few STUXNET samples and live traffic captures from July 2010 while many stuxnet implants were still operational.☆26Updated 11 months ago
- Hardened your Windows OS against forensics analysis☆21Updated 8 months ago
- Slides and files for the Reversing Rust Binaries: One step beyond strings workshop at REcon 2024, presented on June 28, 2024.☆78Updated last year
- A C++ tool for process memory scanning & suspicious telemetry generation that attempts to detect a number of malicious techniques used by…☆84Updated last year
- Exfiltrate data over audio output from remote desktop sessions - Covert channel PoC☆62Updated 8 months ago
- PoC code and tools for Black Hat USA 2024☆24Updated last year
- Tools for offensive security of NetBackup infrastructures☆41Updated 2 years ago
- Binary code coverage visualizer plugin for Ghidra - just without crashes on unknown insns☆19Updated 9 months ago
- examples of using radius2 to solve reversing challenges☆35Updated 7 months ago
- Reverse engineering assistant that extracts strings and related pseudo-code from a binary file.☆51Updated this week
- Golem automates C/C++ vulnerability discovery with SemGrep+LLVM+LLM☆91Updated 2 months ago
- Reverse engineering assistant that uses a locally running LLM to aid with pseudo-code analysis.☆86Updated last month
- details about DIAL protocol vulnerabilities☆29Updated last year
- call gates as stable comunication channel for NT x86 and Linux x86_64☆32Updated 2 years ago
- A Completely Modular LLM Reverse Engineering, Red Teaming, and Vulnerability Research Framework.☆50Updated 9 months ago
- A MBR Fuzzer☆29Updated last year