Visualizations
Interactive visualizations and animations to explore cryptography, algorithms, and cybersecurity concepts
10 interactive visualizations
All
#malware-analysis
#pe-format
#api-hashing
#reverse-engineering
#windows-internals
#kernel
#rootkit
#red-teaming
#malware-detection
#security-architecture
#detection-layers
#evasion-techniques
#cybersecurity
#system-design
#windows-memory
#malware-development
#virtual-memory
#security
#memory-protection
#dns
#networking
#analysis
#resolution
#nameservers
#statistics
#benchmarking
#law-of-large-numbers
#performance
#simulation
#mathematics
#interpolation
#polynomials
#numerical-analysis
#interactive
#lagrange
#easter-egg
#windows-api
#system-internals
#evasion
#cryptography
#classical-ciphers
#linear-algebra
#matrix
#encryption
Showing all 10 visualizations
Export Table Walker
Post Related
Visualizing the manual resolution of API addresses. Demonstrates how malware parses the Export Directory, walks the AddressOfNames, and retrieves function addresses without using GetProcAddress.
By:0xHabib
malware-analysis
pe-format
api-hashing
PE Header Explorer
Post Related
Interactive viewer for the Portable Executable (PE) file format structures. Explore the DOS Header, NT Headers, and Optional Header fields used by the Windows Loader.
By:0xHabib
malware-analysis
pe-format
reverse-engineering
Protected Process Bypass (DKOM)
Post Related
Interactive simulation of a Direct Kernel Object Manipulation (DKOM) attack against Windows Protected Processes (PPL). Steps through loading a driver, locating the EPROCESS structure, and patching the protection bit.
By:0xHabib
windows-internals
kernel
rootkit
+1 more
Malware Detection Architecture
Post Related
Interactive visualization showing how different detection layers work together to identify threats. Explore the architecture, data flow, and evasion techniques used in modern malware detection systems.
By:Mohamed Habib Jaouadi
malware-detection
security-architecture
detection-layers
+3 more
Windows Memory Management
Post Related
Interactive visualization of Windows virtual memory states, allocation patterns, and protection mechanisms. Essential for understanding memory-based malware techniques.
By:Mohamed Habib Jaouadi
windows-memory
malware-development
virtual-memory
+2 more
DNS Resolution Process Visualization
Post Related
Interactive step-by-step demonstration of how DNS queries are resolved from client to authoritative nameserver. Perfect for understanding network security analysis fundamentals.
By:Mohamed Habib Jaouadi
dns
networking
security
+3 more
Law of Large Numbers Simulation
Post Related
Interactive demonstration of how sample size affects the reliability of benchmark measurements. See how the Law of Large Numbers applies to system performance testing.
By:Mohamed Habib Jaouadi
statistics
benchmarking
law-of-large-numbers
+2 more
Lagrange Interpolation Visualization
Interactive visualization of Lagrange interpolation showing how polynomials pass through given points using basis polynomials and mathematical interpolation
By:Mohamed Habib Jaouadi
mathematics
interpolation
polynomials
+4 more
Windows API Call Flow
Post Related
Interactive visualization showing how API calls flow from user applications through system layers to the Windows kernel. Essential for understanding malware evasion techniques.
By:Mohamed Habib Jaouadi
windows-api
malware-development
system-internals
+2 more
Hill Cipher Visualization
Post Related
Interactive visualization of the Hill cipher encryption and decryption process using matrix operations
By:Mohamed Habib Jaouadi
cryptography
classical-ciphers
linear-algebra
+3 more