Hulk is able to bruteforce missing bytes after a DCA attack on AES with his special ability of AES-NI
☆23Nov 27, 2018Updated 7 years ago
Alternatives and similar repositories for Hulk
Users that are interested in Hulk are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Repository of the official Docker image for SideChannelMarvels.☆54Feb 6, 2018Updated 8 years ago
- A tool to perform (higher-order) correlation power analysis attacks (CPA).☆165Jan 27, 2022Updated 4 years ago
- Set of Dynamic Binary Instrumentation and visualization tools for execution traces.☆328Jul 26, 2024Updated last year
- Tools to perform differential fault analysis attacks (DFA).☆364Oct 13, 2023Updated 2 years ago
- Hulk is able to bruteforce missing bytes after a DCA attack on AES with his special ability of AES-NI☆13Mar 20, 2019Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Repository of various public white-box cryptographic implementations and their practical attacks.☆678Apr 10, 2024Updated 2 years ago
- ☆18Mar 21, 2022Updated 4 years ago
- Plugin which enables chai scripts to run inside of x64dbg☆12Jul 10, 2016Updated 9 years ago
- ecdsa operations in go☆10Oct 21, 2019Updated 6 years ago
- browser based dynamic fuzzer☆15Dec 8, 2022Updated 3 years ago
- ☆12Aug 17, 2020Updated 5 years ago
- Record my learn path of HEAP EXPLOITATION on LINUX☆14Feb 2, 2018Updated 8 years ago
- Disassembler Library for x86 and x86-64☆15Apr 7, 2020Updated 6 years ago
- An analysis to detect authors with multiple accounts in comments from the /r/Bitcoin subreddit. See README for a link to the full report☆14Jul 22, 2015Updated 10 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A bot to help organize teams and solve puzzles for Satoshi's Treasure hunt☆11May 5, 2019Updated 6 years ago
- Stateless library for tracking Blockchain transactions☆12Oct 12, 2017Updated 8 years ago
- JavaScript implementation of the BitID authentication protocol: https://github.com/bitid/bitid☆16Sep 15, 2019Updated 6 years ago
- SmartSeed☆10Nov 4, 2018Updated 7 years ago
- Cold storage enabled command line bitcoin wallet based on copay's bitcore☆11Jun 30, 2017Updated 8 years ago
- Bits of advice from brianddk@reddit☆14Sep 19, 2023Updated 2 years ago
- Bitcoin Payment Terminal for Verifone Topaz Sapphire POS☆14Aug 24, 2015Updated 10 years ago
- Nothing interesting to see here. Old hack on the nfc-tools code, mirror of http://nfc-tools.googlecode.com/svn/trunk — see README.md for …☆52Jul 30, 2020Updated 5 years ago
- HElib is an open-source software library that implements homomorphic encryption. It supports the BGV scheme with bootstrapping and the Ap…☆22Jul 6, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Makes Unicorn traces. Generic Side-Channel and Fault Injection simulator☆194Apr 2, 2026Updated last week
- Exercises for (legacy) Computer Security course in the University of Oulu☆46Aug 1, 2023Updated 2 years ago
- This is a repository for the code examples for the second edition of my book 'Hacking Electronics'.☆14Oct 16, 2017Updated 8 years ago
- Place to put small code scraps☆17Dec 4, 2021Updated 4 years ago
- Notebook file transfer through QR codes, using only the screen and webcam☆20Nov 18, 2014Updated 11 years ago
- ☆35Jun 4, 2018Updated 7 years ago
- Demonstration of BitID authentication protocol☆25Jul 10, 2015Updated 10 years ago
- Friendly fork of (unmaintained) https://bitbucket.org/antocuni/fancycompleter☆14Oct 29, 2023Updated 2 years ago
- ☆35Jun 17, 2015Updated 10 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆17Sep 10, 2024Updated last year
- A Python based backdoor that uses Steganography and a Cloud Image Service as a command and control server.☆26Sep 2, 2016Updated 9 years ago
- UR Implementation in Python ported from Blockchain Commons C++ Reference Implementation☆16Sep 17, 2025Updated 6 months ago
- Ghidra is a software reverse engineering (SRE) framework☆11Jan 2, 2025Updated last year
- Bibliothèque C et assembleur permettant le chiffrement/déchiffrement AES-128 de messages pour des composants grand public (famille STM32F…☆70Sep 18, 2022Updated 3 years ago
- 의역이 난무하는 pypy 튜토리얼 한국어 번역. 오역은 이슈트래커로 제보해주시거나, PR 환영합니다=3☆81Aug 13, 2014Updated 11 years ago
- Side-channel toolkit in Julia☆167Jan 14, 2022Updated 4 years ago