An automated toolkit to analyze and detect changes in secure hardware and cryptographic libraries. SCRUTINY provides high-level frameworks to build and later verify profiles against reference and produce detailed HTML reports. For now, SCRUTINY is capable of analyzing JavaCard, TPM, SED, and cryptolibs.
☆16Feb 12, 2026Updated last month
Alternatives and similar repositories for scrutiny
Users that are interested in scrutiny are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Tool for analysis of security certificates and their security targets (Common Criteria, NIST FIPS140-2...).☆25Mar 23, 2026Updated last week
- javacard framework in python☆19Nov 18, 2022Updated 3 years ago
- ☆12Aug 17, 2020Updated 5 years ago
- Python Elliptic Curve Side-Channel Analysis toolkit.☆65Mar 8, 2026Updated 3 weeks ago
- Tests support and behavior of elliptic curve cryptography implementations on JavaCards (TYPE_EC_FP and TYPE_EC_F2M) and in selected softw…☆85Mar 8, 2026Updated 3 weeks ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Distinguisher of Standard & Simulated Elliptic Curves via Traits.☆18Jun 20, 2024Updated last year
- Tool for generation of data from cryptoprimitives (block and stream ciphers, hash functions). Cryptoprimitives are round-reduced and the …☆14Nov 11, 2022Updated 3 years ago
- Automated testing tool for algorithms from JavaCard API supported by particular smart card. Performance testing of almost all available m…☆136Feb 25, 2026Updated last month
- Collection of open-source JavaCard crypto algorithms. Optimized for memory and speed with unified interface☆13Oct 6, 2024Updated last year
- ☆13Sep 6, 2021Updated 4 years ago
- JavaCard project template for building CAP and running JCardSim with gradle + coverage☆19Mar 24, 2024Updated 2 years ago
- A free and open source tool for Deep Learning Side Channel Analysis☆17Oct 31, 2019Updated 6 years ago
- A VHDL IP for ECC (Elliptic Curve Cryptography) hardware acceleration☆46Nov 24, 2025Updated 4 months ago
- Practical Implementation of the Maurer Reduction☆10Jul 13, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆17Feb 15, 2023Updated 3 years ago
- ☆24Jul 7, 2022Updated 3 years ago
- ☆12Sep 9, 2022Updated 3 years ago
- Sending and receiving protobuf using NIO socket☆14Jan 24, 2026Updated 2 months ago
- Curated list of open-source TPM (Trusted Platform Module) applications☆28Dec 12, 2021Updated 4 years ago
- ROCA: Infineon RSA key vulnerability☆491Oct 19, 2023Updated 2 years ago
- SIde-Channel Analysis toolKit: embedded security evaluation tools☆30Dec 31, 2021Updated 4 years ago
- Optical One-Time Pad XOR encoding of images☆17Apr 15, 2023Updated 2 years ago
- Ansible role for Installing Nginx, compiling ModSecurity3, and installing the OWASP CRS v3 ruleset☆11Mar 5, 2024Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Open Source Development Course☆25Apr 23, 2022Updated 3 years ago
- A suite of tools to guide a user through a thorough weekly review in the GTD format.☆16May 3, 2023Updated 2 years ago
- ☆12Feb 19, 2019Updated 7 years ago
- A Common Criteria (CC) and FIDO certified FIDO U2F javacard applet.☆35Jul 28, 2022Updated 3 years ago
- GOSTBOX -- A 95-byte program for the 256-byte Streebog/Kuznyechik S-Box.☆15Feb 20, 2021Updated 5 years ago
- Latex classes for IACR publications.☆15Mar 18, 2026Updated last week
- HILA5 KEM/DEM. Reference and Optimized Implementations + NIST PQC Submission Documents☆18Apr 4, 2018Updated 7 years ago
- Vylepšenie NCZI očkovacieho formuláru☆11Mar 22, 2021Updated 5 years ago
- A very simple way to try Suricata and EveBox☆15Feb 17, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Implementations of do255e and do255s in C and assembly☆25May 3, 2021Updated 4 years ago
- Tool for generating Elliptic curve domain parameters☆131Dec 3, 2025Updated 3 months ago
- A fuzzer for APDU-based smartcard interfaces☆21Mar 16, 2025Updated last year
- Research initiative to make TLS certificate validation usable.☆22May 10, 2024Updated last year
- Implementation of HMAC-based One Time Passwords via URL tag of NDEF applet☆26Aug 15, 2022Updated 3 years ago
- Ansible role to deploy HashiCorp Vault.☆17Mar 31, 2023Updated 2 years ago
- Reads EMV cards, extract public keys, checks them for ROCA vulnerability (https://crocs.fi.muni.cz/public/papers/rsa_ccs17). Uses code fr…☆26Nov 19, 2017Updated 8 years ago