Source code for the HorrorScope and material for the ScaCheapier workshop
☆25Dec 24, 2019Updated 6 years ago
Alternatives and similar repositories for HorrorScope
Users that are interested in HorrorScope are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- cheap and terrible voltage glitcher hardware/software☆43Jan 1, 2020Updated 6 years ago
- Side-channel toolkit in Julia☆167Jan 14, 2022Updated 4 years ago
- ☆21Mar 11, 2021Updated 5 years ago
- Minimal UART client in Golang that dumps LPC1343 chips that are locked at CRP1.☆20Feb 27, 2021Updated 5 years ago
- DL-LA: Deep Learning Leakage Assessment. Source Code and Traces.☆17Nov 9, 2023Updated 2 years ago
- TLCS-90 ROM Reader☆14Nov 5, 2025Updated 4 months ago
- Ledger Donjon CTF 2020☆17Nov 16, 2021Updated 4 years ago
- BADFET☆45Jul 12, 2017Updated 8 years ago
- A custom coprocessor and SoC for hardware security experiments in electronics.☆12May 20, 2017Updated 8 years ago
- This is the code for the fault injection tutorial I wrote. Read the README for more information.☆13Feb 27, 2014Updated 12 years ago
- ECED440 Computer Security☆11Mar 17, 2026Updated last week
- Adding trace to DesignStart for easier side-channel analysis on the CW305 target. Also supports PhyWhisperer.☆17Feb 19, 2025Updated last year
- SCAAML: Side Channel Attacks Assisted with Machine Learning☆193Updated this week
- This repository contain recurring IoT vulnerabilities found by FirmRec.☆17Aug 25, 2023Updated 2 years ago
- ☆11Nov 14, 2024Updated last year
- Python library for Alphanov's PDM laser sources control☆13Feb 24, 2026Updated last month
- Raiden project☆24Nov 7, 2021Updated 4 years ago
- Add support for reading and writing of trace set files (.trs) to Python☆22Feb 12, 2026Updated last month
- ☆55May 13, 2024Updated last year
- IDA Pro plugin to recovery static Thumb2 symbols.☆14Sep 14, 2021Updated 4 years ago
- Some VxWorks fuzzing examples using Cisco-Kitty and WDBDbg framework☆19Mar 13, 2016Updated 10 years ago
- ☆55Apr 21, 2025Updated 11 months ago
- EDID (Enhanced Display Identification Data) Fuzzer☆19Nov 5, 2013Updated 12 years ago
- ☆31Mar 11, 2021Updated 5 years ago
- Implementation of Differential Power Analysis (DPA) and Correlation Power Analysis (CPA) attacks on AES-128☆26May 2, 2023Updated 2 years ago
- Exploit for Real World CTF 6th RIPTC.☆33Jan 31, 2024Updated 2 years ago
- Labs for Software Vulnerabilities: Exploitation and Mitigation university course.☆11Jul 5, 2019Updated 6 years ago
- JTAG Hardware Abstraction Library☆37Oct 23, 2023Updated 2 years ago
- Attempts to glitch the code from a 68HC705C8☆15Jul 19, 2022Updated 3 years ago
- Fault Injection Research and Resources☆21Feb 6, 2023Updated 3 years ago
- A repo with a listing of binary ninja scripts + plugins (massively inspired by https://github.com/onethawt/idaplugins-list)☆18Feb 19, 2017Updated 9 years ago
- Emulating SAMSUNG HM641JI HDD firmware using Unicorn☆11Sep 19, 2022Updated 3 years ago
- Simple STM32F103 based glitcher FW☆36May 16, 2021Updated 4 years ago
- DALI-based Driver for Mbed OS☆10Nov 28, 2018Updated 7 years ago
- Hardware and software for the ECU we use during trainings☆15Apr 29, 2019Updated 6 years ago
- transplant several overlays to s9_pynq board☆17Oct 31, 2020Updated 5 years ago
- ☆10May 31, 2018Updated 7 years ago
- pysap SAPMS+SAPRFC patches for Gateway / MS research☆11Apr 30, 2019Updated 6 years ago
- Upstream crosstool-ng + xilinx branches☆15Mar 23, 2014Updated 12 years ago