A tool for side-channel attacks (SCAs) using deep learning (DL)
☆17Apr 1, 2025Updated 11 months ago
Alternatives and similar repositories for scadl
Users that are interested in scadl are comparing it to the libraries listed below
Sorting:
- Ledger Donjon CTF 2020☆17Nov 16, 2021Updated 4 years ago
- A free and open source tool for Deep Learning Side Channel Analysis☆17Oct 31, 2019Updated 6 years ago
- the most basic introduction to performing a Vcc glitch attack☆26Sep 25, 2017Updated 8 years ago
- Side channel attack (SCA) of AES with Differential Power Analysis (DPA)☆69May 31, 2016Updated 9 years ago
- Examples for the HEBI Robotics Python API☆14Jan 9, 2026Updated 2 months ago
- ☆10Sep 10, 2025Updated 6 months ago
- Allowlist data for Web3Checks☆12Mar 2, 2026Updated last week
- Open-source project to build a low-cost Commercial-Off-The-Shelf on-board computer for small CubeSat missions.☆14May 17, 2021Updated 4 years ago
- Converts Python3 .py files into .exe and makes it so the file can run on any environment without installing python3.☆11Jun 7, 2018Updated 7 years ago
- ☆17Dec 4, 2025Updated 3 months ago
- FELICS Framework☆11Dec 5, 2019Updated 6 years ago
- ECED440 Computer Security☆11Nov 6, 2024Updated last year
- gcnano-binaries☆11Feb 9, 2026Updated last month
- Python library for Alphanov's PDM laser sources control☆13Feb 24, 2026Updated last week
- SCALE: Side-Channel Attack Lab. Exercises☆44Sep 20, 2023Updated 2 years ago
- Tiny shell script to mount disk images and ISO files on rooted Android, on supported Linux kernels. Emulates a flash/optical drive and ca…☆18Nov 5, 2023Updated 2 years ago
- Rescue ramdisk for Pinephone written on Go☆10Apr 21, 2022Updated 3 years ago
- ☆12Oct 23, 2023Updated 2 years ago
- This is a personal script used to link Kali Nethunter Chroot/Termux to the Proxmark3 and small patch for DriveDroid on Android 12.☆11Jan 24, 2022Updated 4 years ago
- A simple way to make working with different binary representations painless, fast, and efficient.☆11Nov 6, 2025Updated 4 months ago
- OAI Network Service in OSM☆12Sep 13, 2025Updated 5 months ago
- Sweetscape 010 Editor Nvidia VBios Templates☆14Aug 12, 2016Updated 9 years ago
- ☆12Apr 17, 2019Updated 6 years ago
- A python program to interact with the AVHzY CT-2 power meter https://store.avhzy.com/index.php?route=product/product&product_id=50☆11Apr 5, 2019Updated 6 years ago
- Cross-Domain DPA Attack on SAML11☆17Jul 14, 2019Updated 6 years ago
- ☆11Mar 14, 2022Updated 3 years ago
- Linux tools to configure ATA security on NVMe drives☆15Mar 5, 2025Updated last year
- Checks whether there is an update for all of your apps available so you can run the next major version of Nextcloud.☆11Apr 2, 2020Updated 5 years ago
- Coleção de informações sobre POS's disponíveis no mercado Brasileiro, com propósito educativo.☆11Sep 6, 2020Updated 5 years ago
- Cheatsheet of space jargon☆12Jan 22, 2025Updated last year
- ☆10Mar 4, 2024Updated 2 years ago
- Higher-order Masking of AES-128 based on the Rivain and Prouff method, CPRR method and Common Shares with Random Reduction method.☆14May 13, 2017Updated 8 years ago
- Intruder.py - A powerful tool to customize attacks on websites. Has 4 different options of attacks☆12Dec 1, 2020Updated 5 years ago
- An automated toolkit to analyze and detect changes in secure hardware and cryptographic libraries. SCRUTINY provides high-level framework…☆16Feb 12, 2026Updated 3 weeks ago
- Another DFU for STM32F103. Download firmware without offsetting from flash base address.☆14Jul 17, 2022Updated 3 years ago
- Ghidra Loader for ESP32 Flash Dumps☆15Feb 10, 2025Updated last year
- Some .tns file for Ti nspire CX CAS about Fluid Mechanics, Theory of Construction and Computational structural mechanics☆14Jan 11, 2023Updated 3 years ago
- USB library for ChipWhisperer devices☆15Jan 22, 2026Updated last month
- Exercises for (legacy) Computer Security course in the University of Oulu☆46Aug 1, 2023Updated 2 years ago