☆17Nov 14, 2022Updated 3 years ago
Alternatives and similar repositories for Rosita
Users that are interested in Rosita are comparing it to the libraries listed below
Sorting:
- ☆54May 13, 2024Updated last year
- ☆20Nov 27, 2023Updated 2 years ago
- A super super fast waveform visualizer for very very big traces☆29Feb 19, 2026Updated 2 weeks ago
- Ledger Donjon CTF 2020☆17Nov 16, 2021Updated 4 years ago
- SCALE: Side-Channel Attack Lab. Exercises☆44Sep 20, 2023Updated 2 years ago
- ☆21Oct 3, 2021Updated 4 years ago
- ☆21Aug 6, 2022Updated 3 years ago
- ☆23Feb 13, 2020Updated 6 years ago
- White-box Design and Analysis kit☆24May 22, 2023Updated 2 years ago
- Add support for reading and writing of trace set files (.trs) to Python☆22Feb 12, 2026Updated 3 weeks ago
- Java client library for integration with Freja eID☆12Feb 27, 2026Updated last week
- PAF (the Physical Attack Framework) is a framework for learning about physical attacks: fault injection and side channels☆25Nov 20, 2025Updated 3 months ago
- Dr. Disassembler☆38Jan 5, 2022Updated 4 years ago
- ☆19Updated this week
- Bibliothèque C et assembleur permettant le chiffrement/déchiffrement AES-128 de messages pour des composants grand public (famille STM32F…☆70Sep 18, 2022Updated 3 years ago
- Optimized assembly implementations of crypto for the RV32I (RISC-V) architecture☆31Oct 14, 2020Updated 5 years ago
- Generic exploit for all version 7 (maybe others) LM32-based AMD SMU's used in APUs (and probably works on GPUs too)☆39Aug 15, 2023Updated 2 years ago
- ☆38Aug 21, 2025Updated 6 months ago
- Qt Side Channel Analysis Tool to handle signal traces and more☆33Aug 10, 2021Updated 4 years ago
- Kernel module that makes it possible to create virtual wifi devices each with a virtualized stack.☆11Dec 13, 2011Updated 14 years ago
- ☆81May 20, 2022Updated 3 years ago
- ecdsattack is a package which retrieves private keys from faulted ECDSA signatures.☆45Nov 28, 2022Updated 3 years ago
- Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.☆18Mar 22, 2020Updated 5 years ago
- Instruction and files for porting Arm DesignStart to CW305.☆16Dec 6, 2023Updated 2 years ago
- ECED440 Computer Security☆11Nov 6, 2024Updated last year
- Code and artifacts of the "Dissecting American Fuzzy Lop - A FuzzBench Evaluation" paper☆13Oct 3, 2022Updated 3 years ago
- Python library for Alphanov's PDM laser sources control☆13Feb 24, 2026Updated last week
- OpenTitan FI formal verification framework☆16Aug 29, 2023Updated 2 years ago
- ☆12Feb 8, 2021Updated 5 years ago
- Alistair's fork of the Linux kernel source tree. Including sources for the mainline reMarkable 2 kernel development, sunxi patches and ot…☆11Feb 16, 2026Updated 3 weeks ago
- A guide on how to emulate an NVMe SPDM responder device with QEMU and Linux. Additionally, instructions on setting up and testing the (in…☆11Sep 3, 2024Updated last year
- Donjon hardware tool for circuits security evaluation☆101Dec 4, 2025Updated 3 months ago
- Side-Channel Analysis Library☆106Feb 10, 2026Updated 3 weeks ago
- "A Practical Recipe for Hardware Implants" presentation materials.☆13Nov 10, 2020Updated 5 years ago
- Read out firmware of some STM32 parts☆13Jul 20, 2025Updated 7 months ago
- A test library for computing modular exponentiation in parallel using AVX-512 vector arithmetic☆12Dec 18, 2023Updated 2 years ago
- WIP: code generation package in Go -- used by gnark, goff and gurvy☆14Feb 19, 2026Updated 2 weeks ago
- MouHidInputHook enables users to filter, modify, and inject mouse input data packets into the input data stream of HID USB mouse devices …☆11Jul 11, 2019Updated 6 years ago
- NIST P-256 signatures for Cortex-M4 microcontrollers☆16Mar 14, 2021Updated 4 years ago