SideChannelMarvels / HulkLinks
Hulk is able to bruteforce missing bytes after a DCA attack on AES with his special ability of AES-NI
☆23Updated 6 years ago
Alternatives and similar repositories for Hulk
Users that are interested in Hulk are comparing it to the libraries listed below
Sorting:
- Repository of the official Docker image for SideChannelMarvels.☆54Updated 7 years ago
- Open tools for side-channel analysis and related techniques. Currently, this repository contains: 1) A near-field EM probe amplifier circ…☆37Updated 10 years ago
- Debugger with hardware breakpoints and memory watchpoints for BCM4339 Wi-Fi chips☆57Updated 7 years ago
- Simple TPM utils in Python for generating random numbers & RSA keys☆19Updated 8 years ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆20Updated 3 years ago
- Official archive of https://code.google.com/p/cryptospecs/☆75Updated 6 years ago
- Cryptographic Dataset Generation & Modelling Framework☆38Updated 5 years ago
- Block-based software vulnerability fuzzing framework☆49Updated 6 years ago
- Hardware design files for the PMOD based MUX☆13Updated 5 years ago
- A GUI-based USB device fuzzer☆64Updated 7 years ago
- A simple ISO7816 analyzer that only requires the data-stream.☆61Updated 7 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 8 years ago
- USB armory - hardware control tool☆32Updated 5 months ago
- NSA Playset implant for bridging airgaps without radio☆16Updated 9 years ago
- ☆24Updated 10 years ago
- bunch of random stuff☆21Updated 5 years ago
- Tools and scripts for firmware reverse engeneering☆48Updated 4 years ago
- Tools for viewing and extracting HDD firmware files☆74Updated 10 years ago
- Python-based interactive assembler/disassembler CLI, powered by Keystone/Capstone.☆31Updated 8 years ago
- SSH Man In The Middle proxy with credentials interception, asciinema session replay, ...☆23Updated 8 years ago
- crauEmu is an uEmu extension for developing and analyzing payloads for code-reuse attacks☆110Updated 5 years ago
- A tool to perform (higher-order) correlation power analysis attacks (CPA).☆162Updated 3 years ago
- Misc PoCs for various research topics☆21Updated 2 years ago
- Tools for analyzing hexagon code☆39Updated 9 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆56Updated 8 years ago
- My binary ninja plugin that encapsulate frida, unicorn, capstone and keystone☆73Updated 7 years ago
- Fault attack agaisnt EdDSA demonstrated on an Arduino Nano board, allowing for partial key recovery and fake signatures.☆72Updated 7 years ago
- Some RSA attacks with sage☆11Updated 8 years ago
- ☆35Updated 7 years ago
- IDA Pro processor module for Altera Nios II Classic/Gen2 microprocessor architecture☆31Updated last year