Python3 library for sophisticated timing attacks using Gaussian Mixture Model.
☆22Apr 10, 2022Updated 3 years ago
Alternatives and similar repositories for timing-analysis
Users that are interested in timing-analysis are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆18May 6, 2023Updated 2 years ago
- Make inso available in your GitHub Actions workflows☆11Jul 16, 2025Updated 8 months ago
- CompChomper is a framework for measuring how LLMs perform at code completion.☆21Apr 29, 2025Updated 10 months ago
- A cookiecutter template for creating a new LLM plugin that adds tools to LLM☆29May 27, 2025Updated 9 months ago
- A CLI that utilizes Okta IdP via SAML to acquire temporary AWS credentials☆10Jun 30, 2021Updated 4 years ago
- Accompanying material needed for the workshop☆11Jun 14, 2023Updated 2 years ago
- Translator from asm to C, but not decompiler. Something between compiler and decompiler.☆56Aug 31, 2021Updated 4 years ago
- ☆36Mar 6, 2026Updated 2 weeks ago
- General research for Dreadnode☆26Jun 17, 2024Updated last year
- micro-gpt in ASM on the Super Nintendo☆51Feb 12, 2026Updated last month
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55May 7, 2025Updated 10 months ago
- A Cybersecurity Generalist LLM (ICLR'26)☆36Feb 9, 2026Updated last month
- A small collection of scripts that are useful for implementing Domain Fronting in an assessment.☆14Apr 25, 2019Updated 6 years ago
- MySQL Injection Exfoliation Optimization☆24Sep 15, 2019Updated 6 years ago
- Community Eventing and Scripting examples☆18Aug 11, 2025Updated 7 months ago
- A tool to create obfuscated HTA script.☆178Jul 2, 2021Updated 4 years ago
- OWASP Foundation Web Respository☆12Jan 28, 2026Updated last month
- ☆19Feb 19, 2025Updated last year
- Make DSPy Agentic using protocol-first approach that support the Agent Protocols like MCP, A2A☆73May 27, 2025Updated 9 months ago
- ReconPro is a specialized Google dorking tool designed for cybersecurity professionals and bug bounty hunters.☆46Updated this week
- ☆12Mar 14, 2022Updated 4 years ago
- A tool that can be used to close network connections automatically with a given parameters☆14Apr 19, 2023Updated 2 years ago
- HTTP testing platform for security researchers☆21Mar 14, 2026Updated last week
- PostMessage extension☆102Aug 28, 2019Updated 6 years ago
- A monitoring hub that watches popular open-source repositories and uses AI to detect when commits are patching security vulnerabilities -…☆82Updated this week
- Enumerate all visible network printers in local network☆19Jan 23, 2017Updated 9 years ago
- A Kubernetes operator for managing Prefect servers and work pools☆17Updated this week
- A collection of shell code conversion scripts that I have written over time for repetitive tasks☆19Jul 6, 2019Updated 6 years ago
- ☆10May 31, 2015Updated 10 years ago
- Python client for the Open eXecution Protocol (OXP)☆17May 16, 2025Updated 10 months ago
- CVE-2019-9580 - StackStorm: exploiting CORS misconfiguration (null origin) to gain RCE☆31Mar 13, 2019Updated 7 years ago
- A simple implementation of an "Error" [pseudo-]monad for Ruby.☆16Dec 29, 2015Updated 10 years ago
- A proof of concept for obfuscating an x86_64 ELF executable without binary lifting. Done as a challenge project.☆18Feb 12, 2019Updated 7 years ago
- Disable PPL via custom driver and dump lsass☆15Mar 13, 2021Updated 5 years ago
- Slides and Code for the BHUSA 2019 talk: Flying a False Flag☆238Nov 8, 2019Updated 6 years ago
- The PoC files for ethereum client's JSON-RPC DNS Rebinding☆35Jan 22, 2018Updated 8 years ago
- mult-answer plugin for CTFd☆15Aug 22, 2019Updated 6 years ago
- Writeups/exploit code for CTFs I've done☆13Aug 29, 2021Updated 4 years ago
- ☆11Nov 19, 2017Updated 8 years ago