White-box Design and Analysis kit
☆24May 22, 2023Updated 2 years ago
Alternatives and similar repositories for wboxkit
Users that are interested in wboxkit are comparing it to the libraries listed below
Sorting:
- ☆15Sep 7, 2020Updated 5 years ago
- ecdsattack is a package which retrieves private keys from faulted ECDSA signatures.☆45Nov 28, 2022Updated 3 years ago
- White-box Analysis and Implementation Tools☆78Jan 27, 2022Updated 4 years ago
- Beta Version of Cryptographic Fault Diagnosis Tool (VerFI)☆13Nov 6, 2020Updated 5 years ago
- Tools for studying S-boxes☆37Updated this week
- ☆17Nov 14, 2022Updated 3 years ago
- POC about how to detect windows kernel debug by pool tag.☆13Nov 29, 2023Updated 2 years ago
- ☆21Oct 3, 2021Updated 4 years ago
- ☆10Dec 27, 2022Updated 3 years ago
- Android Binder crate in pure Rust☆11Feb 15, 2018Updated 8 years ago
- Implicit White-box Implementations of ARX Ciphers☆16Nov 16, 2022Updated 3 years ago
- A super super fast waveform visualizer for very very big traces☆31Mar 6, 2026Updated last week
- AES-128 and DES differential fault analysis☆16Jan 20, 2021Updated 5 years ago
- DBLP BibTeX - bibtex wrapper for automatic DBLP & IACR ePrint downloads☆20Mar 29, 2023Updated 2 years ago
- A Python library for private set intersection☆13Apr 27, 2020Updated 5 years ago
- Ledger Donjon CTF 2020☆17Nov 16, 2021Updated 4 years ago
- Hello World examples in assembly, for use as templates.☆12Jan 18, 2026Updated 2 months ago
- Misuse cases of Cryptography in real world software products☆12Nov 4, 2018Updated 7 years ago
- Qt Side Channel Analysis Tool to handle signal traces and more☆33Aug 10, 2021Updated 4 years ago
- Set of Dynamic Binary Instrumentation and visualization tools for execution traces.☆328Jul 26, 2024Updated last year
- ☆21Aug 6, 2022Updated 3 years ago
- GOSTBOX -- A 95-byte program for the 256-byte Streebog/Kuznyechik S-Box.☆15Feb 20, 2021Updated 5 years ago
- legacy MTK devices preLoader from Mediatek☆20Apr 29, 2024Updated last year
- Linear-complexity Private Function Evaluation (PFE) based on homomorphic encryption (as presented at ESORICS'20).☆10Sep 14, 2020Updated 5 years ago
- Android App that genereates passcode authentication codes for Postfinance cards☆12Feb 22, 2022Updated 4 years ago
- A tool to perform so called BGE attack☆26Jun 13, 2025Updated 9 months ago
- Retroid Pocket 2 kernel from Retroid☆12Dec 27, 2022Updated 3 years ago
- differential fault analysis attacks (DFA) against SM4☆17Jun 6, 2024Updated last year
- Overlay chroot☆16Apr 16, 2020Updated 5 years ago
- A bridge from UFOs to the FDK (and therefore, OTFs).☆27Nov 28, 2025Updated 3 months ago
- ☆12Jan 13, 2025Updated last year
- Add support for reading and writing of trace set files (.trs) to Python☆22Feb 12, 2026Updated last month
- ☆20Mar 3, 2026Updated 2 weeks ago
- Private version of CMTAT security token in Noir (Aztec network DSL)☆18Dec 17, 2025Updated 3 months ago
- Albums for the Illustrated RFID gallery☆38Updated this week
- Raiden project☆24Nov 7, 2021Updated 4 years ago
- Tool to automatically search for linear characteristics☆39Jan 27, 2016Updated 10 years ago
- Stay updated with the latest deadlines for top Multi-Party Computation (MPC) events, including conferences, journals, and workshops. Neve…☆21Mar 9, 2026Updated last week
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆29Sep 11, 2021Updated 4 years ago