A tool to perform (higher-order) correlation power analysis attacks (CPA).
☆165Jan 27, 2022Updated 4 years ago
Alternatives and similar repositories for Daredevil
Users that are interested in Daredevil are comparing it to the libraries listed below
Sorting:
- Repository of the official Docker image for SideChannelMarvels.☆54Feb 6, 2018Updated 8 years ago
- Set of Dynamic Binary Instrumentation and visualization tools for execution traces.☆328Jul 26, 2024Updated last year
- Repository of various public white-box cryptographic implementations and their practical attacks.☆675Apr 10, 2024Updated last year
- Hulk is able to bruteforce missing bytes after a DCA attack on AES with his special ability of AES-NI☆23Nov 27, 2018Updated 7 years ago
- Tools to perform differential fault analysis attacks (DFA).☆362Oct 13, 2023Updated 2 years ago
- A White-Box Masking Scheme Against Computational and Algebraic Attacks☆13Jan 6, 2021Updated 5 years ago
- Qt Side Channel Analysis Tool to handle signal traces and more☆33Aug 10, 2021Updated 4 years ago
- Side-channel toolkit in Julia☆167Jan 14, 2022Updated 4 years ago
- Repository of small utilities related to key recovery☆286Mar 30, 2024Updated last year
- Tutorials and examples on how to use Jlsca, the high-performance side channel analysis toolkit written in Julia☆53Feb 15, 2020Updated 6 years ago
- White-box Design and Analysis kit☆24May 22, 2023Updated 2 years ago
- White-box Analysis and Implementation Tools☆78Jan 27, 2022Updated 4 years ago
- Source code of the Whitebox Contest Submission Server☆34Aug 5, 2024Updated last year
- A tutorial on side channel leakage modelling using linear regression☆15Nov 20, 2017Updated 8 years ago
- An implementation of the second-order Differential Power Analysis (DPA) attack, suited for evaluations of AES-128 algorithm on microcontr…☆19Aug 6, 2013Updated 12 years ago
- Cross-Domain DPA Attack on SAML11☆17Jul 14, 2019Updated 6 years ago
- ☆21Aug 6, 2022Updated 3 years ago
- An implementation of the first-order Differential Power Analysis (DPA) attack, suited for evaluations of AES-128 algorithm on microcontro…☆27Aug 6, 2013Updated 12 years ago
- A tool to perform so called BGE attack☆26Jun 13, 2025Updated 9 months ago
- ☆20Dec 13, 2019Updated 6 years ago
- An attack of the ASCAD dataset in 5 minutes☆11Sep 3, 2023Updated 2 years ago
- LEIA: the Lab Embedded ISO7816 Analyzer A Custom Smartcard Reader for the ChipWhisperer PCB☆22Nov 9, 2021Updated 4 years ago
- Resources to break Adoring Poitras from WhibOx contest☆19Apr 13, 2020Updated 5 years ago
- ChipWhisperer - the complete open-source toolchain for side-channel power analysis and glitching attacks☆1,436Feb 25, 2026Updated 3 weeks ago
- SIde-Channel Analysis toolKit: embedded security evaluation tools☆30Dec 31, 2021Updated 4 years ago
- Toolbox for advanced differential power analysis of symmetric key cryptographic algorithm implementations☆50Sep 15, 2018Updated 7 years ago
- Hardware and software for the ECU we use during trainings☆15Apr 29, 2019Updated 6 years ago
- Ledger Donjon CTF 2020☆17Nov 16, 2021Updated 4 years ago
- CHES 2022 White-box Cryptography Tutorial☆20Nov 18, 2022Updated 3 years ago
- go library for ChipWhisperer hardware security platform☆21Aug 1, 2019Updated 6 years ago
- Open tools for side-channel analysis and related techniques. Currently, this repository contains: 1) A near-field EM probe amplifier circ…☆38Dec 17, 2014Updated 11 years ago
- Fault Injection Research and Resources☆21Feb 6, 2023Updated 3 years ago
- Beta Version of Cryptographic Fault Diagnosis Tool (VerFI)☆13Nov 6, 2020Updated 5 years ago
- Makes Unicorn traces. Generic Side-Channel and Fault Injection simulator☆194Aug 13, 2025Updated 7 months ago
- Challenges from CSAW 2019 Pwn Race Edition☆12Nov 8, 2019Updated 6 years ago
- Implicit White-box Implementations of ARX Ciphers☆16Nov 16, 2022Updated 3 years ago
- The RHme2 (Riscure Hack me 2) is a low level hardware CTF challenge that comes in the form of an Arduino Nano board. The new edition prov…☆59Mar 27, 2017Updated 8 years ago
- ecdsattack is a package which retrieves private keys from faulted ECDSA signatures.☆45Nov 28, 2022Updated 3 years ago
- library assisting side-channel-analysis attacks, preprocessing and interactive inspection☆20Jan 5, 2019Updated 7 years ago