ElectroMagnetic Mining Array. A tool for the distributed analysis of electromagnetic radiation in context of cryptographic side-channel attacks.
☆46Nov 21, 2022Updated 3 years ago
Alternatives and similar repositories for emma
Users that are interested in emma are comparing it to the libraries listed below
Sorting:
- Frequency domain method to determine band occupancy and modulation parameters for an ensemble of communication signals☆12Aug 24, 2017Updated 8 years ago
- An interactive notebook for understanding the relation between mutual information, perceived and hypothetical information☆11Feb 28, 2020Updated 6 years ago
- The reporitory contains scripts and data used in the paper <Advanced Far Field EM Side-Channel Attack on AES Based on Deep Learning>. Thi…☆12Jun 24, 2021Updated 4 years ago
- ☆13Dec 11, 2017Updated 8 years ago
- MATLAB scripts for efficient template attacks☆14Apr 20, 2018Updated 7 years ago
- WiMAX LDPC encoder/decoder library☆19Sep 24, 2019Updated 6 years ago
- Julia bindings for AMD's clFFT library☆16Aug 22, 2023Updated 2 years ago
- ☆37Jun 6, 2017Updated 8 years ago
- OsmoTRX - GSM base station transceiver☆22Apr 4, 2019Updated 6 years ago
- Toolbox for advanced differential power analysis of symmetric key cryptographic algorithm implementations☆50Sep 15, 2018Updated 7 years ago
- Translating human input as kubectl commands using LLMs powered by Yacana☆12Feb 4, 2026Updated 3 weeks ago
- SCAAML: Side Channel Attacks Assisted with Machine Learning☆191Feb 23, 2026Updated last week
- One Day of Python for SaintCon 2022☆11Jan 3, 2023Updated 3 years ago
- Read PostgreSQL data files without credentials - forensics, data recovery, and security research tool☆34Jan 18, 2026Updated last month
- Ledger's Advanced Side-Channel Analysis Repository☆403Sep 5, 2023Updated 2 years ago
- ☆30Jan 24, 2022Updated 4 years ago
- ☆10Sep 10, 2025Updated 5 months ago
- SCIM 2.0 JAVA development kit☆17May 2, 2025Updated 10 months ago
- A curated list of awesome side-channel attack resources☆106Nov 23, 2025Updated 3 months ago
- discover IP ranges. check email security. survey domains.☆40Mar 9, 2023Updated 2 years ago
- Proof-of-concept C implementation of AES with masking technique to prevent side-channel analysis attacks☆40Oct 7, 2020Updated 5 years ago
- Modern Honey Network deployment with ansible☆12Jun 4, 2022Updated 3 years ago
- This is a script to import Cisco Talos's IP Blacklist into a Tag (Host Group) within Stealthwatch. This will also optionally create a Cu…☆11May 22, 2023Updated 2 years ago
- PhyWhisperer-USB: Hardware USB Trigger☆93Mar 22, 2024Updated last year
- Auth0 FGA SDK for Go - Use https://github.com/openfga/go-sdk instead☆13Feb 23, 2024Updated 2 years ago
- Research_speech_speaker_verification_nist_sre2010☆12Mar 1, 2016Updated 10 years ago
- Bit-Interleaving-Code-Modulation OFDM, supports 2-64 QAM, any rate convolutional code, turbo, block code , Linear MMSE, MMSE, MMSE-DFE, L…☆12Feb 20, 2022Updated 4 years ago
- The dataset was used as a support to attack obfuscations. It is the largest obfuscated dataset, with realistic and various binaries and f…☆19Jan 15, 2026Updated last month
- Python library for Alphanov's PDM laser sources control☆13Feb 24, 2026Updated last week
- Image Encryption Using Arnold Cat Map, Logistic Map, and Selective Technique.☆10Jul 6, 2018Updated 7 years ago
- ECED440 Computer Security☆11Nov 6, 2024Updated last year
- FELICS Framework☆11Dec 5, 2019Updated 6 years ago
- This is the Matlab simulation of Polar Codes, including the channel polarization, SC, SCL and CA-SCL decoder.☆11Jun 16, 2020Updated 5 years ago
- Converts Python3 .py files into .exe and makes it so the file can run on any environment without installing python3.☆11Jun 7, 2018Updated 7 years ago
- Queries from the blog posts.☆15Oct 6, 2024Updated last year
- My best Java class to compress any String, short or long, with any character of human history☆12Feb 16, 2026Updated 2 weeks ago
- ☆13Jan 17, 2022Updated 4 years ago
- The Eureka Lab Series is designed for learners at all levels of experience and interest in security concepts and technologies.☆10Nov 30, 2025Updated 3 months ago
- Sample data generator for the Splunk for Palo Alto Networks app.☆12Sep 25, 2016Updated 9 years ago