SideChannelMarvels / HulkLinks
Hulk is able to bruteforce missing bytes after a DCA attack on AES with his special ability of AES-NI
☆23Updated 6 years ago
Alternatives and similar repositories for Hulk
Users that are interested in Hulk are comparing it to the libraries listed below
Sorting:
- Repository of the official Docker image for SideChannelMarvels.☆54Updated 7 years ago
- ChipWhisperer-Lint is an open source implementation of our automated leakage detection tool.☆17Updated 6 years ago
- DFA scripts using Jlsca☆10Updated 5 years ago
- BADFET☆44Updated 7 years ago
- A simple ISO7816 analyzer that only requires the data-stream.☆61Updated 6 years ago
- A GUI-based USB device fuzzer☆64Updated 7 years ago
- A research tool to identify the version of shared library files.☆22Updated 8 years ago
- Open tools for side-channel analysis and related techniques. Currently, this repository contains: 1) A near-field EM probe amplifier circ…☆36Updated 10 years ago
- Mirror of lascar (https://github.com/Ledger-Donjon/lascar)☆14Updated 6 years ago
- A tool to perform (higher-order) correlation power analysis attacks (CPA).☆162Updated 3 years ago
- A medley of PoCs and exploits☆1Updated 5 years ago
- Python-based interactive assembler/disassembler CLI, powered by Keystone/Capstone.☆31Updated 8 years ago
- Tools for analyzing hexagon code☆38Updated 9 years ago
- Here are my writeups about various reverse engineering and exploitation problems, mostly on unix/linux and using open source tools☆39Updated 8 years ago
- Debugger with hardware breakpoints and memory watchpoints for BCM4339 Wi-Fi chips☆57Updated 7 years ago
- A highly portable, self-contained version of ROUND5 post-quantum algorithms for embedded platforms.☆17Updated 5 years ago
- An embedded-focused banned.h / strsafe variant intended to assist for Secure Software Development Lifecycle for Embedded Developers☆15Updated 5 years ago
- Here be dragons. Or Slides. Or Papers. Or Nothing :)☆32Updated 6 years ago
- This tool for crack hash password BLAKE-224 BLAKE-256 BLAKE-512 BLAKE-384 with bruteforce method☆18Updated 7 years ago
- Exploitation on different architectures (x86, x64, arm, mips, avr)☆35Updated 6 years ago
- Python library for Alphanov's PDM laser sources control☆11Updated 5 years ago
- Misc PoCs for various research topics☆21Updated 2 years ago
- Low-Observable Physical Host Instrumentation: A suite of tools supporting introspection and semantic gap reconstruction for both physical…☆30Updated 8 years ago
- ☆24Updated 9 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Updated 6 years ago
- Timing Sidechannel workshop☆29Updated 11 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆34Updated 3 years ago
- Block-based software vulnerability fuzzing framework☆49Updated 6 years ago
- ☆13Updated 7 years ago
- IRC bot providing assemble / disassemble for various architectures, powered by Capstone / Keystone☆15Updated 2 years ago