Repository of the official Docker image for SideChannelMarvels.
☆54Feb 6, 2018Updated 8 years ago
Alternatives and similar repositories for Orka
Users that are interested in Orka are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A tool to perform (higher-order) correlation power analysis attacks (CPA).☆165Jan 27, 2022Updated 4 years ago
- Hulk is able to bruteforce missing bytes after a DCA attack on AES with his special ability of AES-NI☆23Nov 27, 2018Updated 7 years ago
- Set of Dynamic Binary Instrumentation and visualization tools for execution traces.☆328Jul 26, 2024Updated last year
- Tools to perform differential fault analysis attacks (DFA).☆364Oct 13, 2023Updated 2 years ago
- Repository of various public white-box cryptographic implementations and their practical attacks.☆679Apr 10, 2024Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Qt Side Channel Analysis Tool to handle signal traces and more☆33Aug 10, 2021Updated 4 years ago
- ☆21Aug 6, 2022Updated 3 years ago
- GPU code for the first SHA-1 collision attack and two freestart attacks☆14Jun 22, 2020Updated 5 years ago
- BRUTUS is an alternative, fast testing framework for CAESAR ciphers.☆24Aug 5, 2016Updated 9 years ago
- Ledger Donjon CTF 2020☆17Nov 16, 2021Updated 4 years ago
- Cross-Domain DPA Attack on SAML11☆17Jul 14, 2019Updated 6 years ago
- ☆21Oct 3, 2021Updated 4 years ago
- FutureTrust analyzes electronic identification (eID) services in Europe and beyond. It is funded within the EU Framework Programme for Re…☆12Nov 16, 2022Updated 3 years ago
- The RHme2 (Riscure Hack me 2) is a low level hardware CTF challenge that comes in the form of an Arduino Nano board. The new edition prov…☆60Mar 27, 2017Updated 9 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆22Oct 20, 2019Updated 6 years ago
- DARPA Cyber Grand Challenge OS syscall library☆19Feb 1, 2017Updated 9 years ago
- Source codes for paper "An Algebraic Formulation of the Division Property: Revisiting Degree Evaluations, Cube Attacks, and Key-Independe…☆18Aug 29, 2020Updated 5 years ago
- Regular expression Search on the command-line☆16Mar 31, 2025Updated last year
- FLECC_IN_C is a FLexible Elliptic Curve Cryptography library written IN C☆18Nov 17, 2017Updated 8 years ago
- Utility to read custom structure from Tencent's libshell packer☆39Dec 15, 2018Updated 7 years ago
- ChipWhisperer - the complete open-source toolchain for side-channel power analysis and glitching attacks☆19Mar 18, 2019Updated 7 years ago
- An interactive notebook for understanding the relation between mutual information, perceived and hypothetical information☆11Feb 28, 2020Updated 6 years ago
- CoRIM and CoMID manipulation library☆22Apr 7, 2026Updated 3 weeks ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Mifare Classic Plus - Hardnested Attack Implementation for SCL3711 LibNFC USB reader☆20Aug 4, 2019Updated 6 years ago
- A super super fast waveform visualizer for very very big traces☆31Apr 21, 2026Updated last week
- ecdsattack is a package which retrieves private keys from faulted ECDSA signatures.☆45Nov 28, 2022Updated 3 years ago
- ☆22Jul 19, 2025Updated 9 months ago
- SPI flash MITM and emulation (QSPI is a WIP)☆20Jan 27, 2022Updated 4 years ago
- Hulk is able to bruteforce missing bytes after a DCA attack on AES with his special ability of AES-NI☆13Mar 20, 2019Updated 7 years ago
- MIT 6.875☆14Dec 13, 2025Updated 4 months ago
- BADFET☆45Jul 12, 2017Updated 8 years ago
- Helpful scripts for various tasks performed during reverse engineering the Shannon Baseband with the goal to exploit the Samsung Galaxy S…☆256Jun 22, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Binaryninja AVR architecture plugin with lifting☆45Oct 26, 2023Updated 2 years ago
- A Model Context Protocol server for IDA☆27Mar 25, 2025Updated last year
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆15May 3, 2014Updated 11 years ago
- Instruction cache leakage detection tool for modular exponentation software.☆14Mar 17, 2017Updated 9 years ago
- LEIA: the Lab Embedded ISO7816 Analyzer A Custom Smartcard Reader for the ChipWhisperer PCB☆23Nov 9, 2021Updated 4 years ago
- Supporting materials for our EuroS&P paper: Automated Verification for Secure Messaging Protocols and their Implementations: A Symbolic a…☆37May 30, 2022Updated 3 years ago
- Writeups for the RHME3 Challenges☆53Jan 7, 2019Updated 7 years ago