Repository of the official Docker image for SideChannelMarvels.
☆54Feb 6, 2018Updated 8 years ago
Alternatives and similar repositories for Orka
Users that are interested in Orka are comparing it to the libraries listed below
Sorting:
- A tool to perform (higher-order) correlation power analysis attacks (CPA).☆164Jan 27, 2022Updated 4 years ago
- Hulk is able to bruteforce missing bytes after a DCA attack on AES with his special ability of AES-NI☆23Nov 27, 2018Updated 7 years ago
- Set of Dynamic Binary Instrumentation and visualization tools for execution traces.☆328Jul 26, 2024Updated last year
- Repository of small utilities related to key recovery☆282Mar 30, 2024Updated last year
- Tools to perform differential fault analysis attacks (DFA).☆364Oct 13, 2023Updated 2 years ago
- Repository of various public white-box cryptographic implementations and their practical attacks.☆672Apr 10, 2024Updated last year
- Qt Side Channel Analysis Tool to handle signal traces and more☆33Aug 10, 2021Updated 4 years ago
- Side-channel toolkit in Julia☆167Jan 14, 2022Updated 4 years ago
- A tool to perform so called BGE attack☆26Jun 13, 2025Updated 8 months ago
- Tutorials and examples on how to use Jlsca, the high-performance side channel analysis toolkit written in Julia☆52Feb 15, 2020Updated 6 years ago
- Ledger Donjon CTF 2020☆17Nov 16, 2021Updated 4 years ago
- BSODomizer HD: HDL for Cyclone V GX Starter Kit☆15Aug 5, 2016Updated 9 years ago
- ☆21Aug 6, 2022Updated 3 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆15May 3, 2014Updated 11 years ago
- Cross-Domain DPA Attack on SAML11☆17Jul 14, 2019Updated 6 years ago
- Regular expression Search on the command-line☆16Mar 31, 2025Updated 11 months ago
- Wardriving ekoparty☆15Oct 9, 2017Updated 8 years ago
- Toolbox for advanced differential power analysis of symmetric key cryptographic algorithm implementations☆50Sep 15, 2018Updated 7 years ago
- An interactive notebook for understanding the relation between mutual information, perceived and hypothetical information☆11Feb 28, 2020Updated 6 years ago
- Hulk is able to bruteforce missing bytes after a DCA attack on AES with his special ability of AES-NI☆13Mar 20, 2019Updated 6 years ago
- DARPA Cyber Grand Challenge OS syscall library☆18Feb 1, 2017Updated 9 years ago
- Recon materials☆27Nov 18, 2017Updated 8 years ago
- CVE-2021-39685 Description and sample exploit for Linux USB Gadget overflow vulnerability☆14Apr 28, 2022Updated 3 years ago
- A super super fast waveform visualizer for very very big traces☆29Feb 19, 2026Updated last week
- SD/MMC Analyzer for Saleae Logic☆39Mar 18, 2024Updated last year
- ASCII Smuggling Hidden Prompt Injection is a novel approach to hacking AI assistants using Unicode Tags. This project demostrate how to u…☆18Aug 7, 2024Updated last year
- Instruction cache leakage detection tool for modular exponentation software.☆15Mar 17, 2017Updated 8 years ago
- A research tool to identify the version of shared library files.☆22Mar 14, 2017Updated 8 years ago
- ChipWhisperer - the complete open-source toolchain for side-channel power analysis and glitching attacks☆18Mar 18, 2019Updated 6 years ago
- BADFET☆45Jul 12, 2017Updated 8 years ago
- ActionScript Proof of Concept to perform cross-domain reads☆16Aug 26, 2013Updated 12 years ago
- FLECC_IN_C is a FLexible Elliptic Curve Cryptography library written IN C☆18Nov 17, 2017Updated 8 years ago
- Here are the challenges (including sources) of the GreHack CTF.☆107May 18, 2024Updated last year
- ecdsattack is a package which retrieves private keys from faulted ECDSA signatures.☆46Nov 28, 2022Updated 3 years ago
- Tool to test different CTF scoring algorithms on real data☆17May 3, 2021Updated 4 years ago
- A meta-scan tool used to kick off a number of command-line security tools during VA/PT work.☆23May 1, 2022Updated 3 years ago
- SPI flash MITM and emulation (QSPI is a WIP)☆20Jan 27, 2022Updated 4 years ago
- ☆20Jul 18, 2019Updated 6 years ago
- Simple proxy designed to intercept and modify connections on the transport level. This means you can also modify TLS raw bytes.☆17Dec 13, 2021Updated 4 years ago