twosixlabs / PE_for_AndroidLinks
Privacy Enhancements for Android
☆14Updated 5 years ago
Alternatives and similar repositories for PE_for_Android
Users that are interested in PE_for_Android are comparing it to the libraries listed below
Sorting:
- Tool for generation of data from cryptoprimitives (block and stream ciphers, hash functions). Cryptoprimitives are round-reduced and the …☆14Updated 3 years ago
- Convert log messages by phones with XGold baseband processor back to GSM/UMTS radio messages☆158Updated 11 years ago
- Radio Side-Channels in Mixed-Signal Chips☆151Updated 5 months ago
- Zigator: A security analysis tool for Zigbee and Thread networks☆33Updated 2 years ago
- ☆25Updated 3 years ago
- Implementation of the key recovery attack against GEA-1 keys (Eurocrypt 2021)☆49Updated 4 years ago
- Capture data from QPSK-demodulated OOB bitstream with Saleae logic analyzer and output byte stream.☆21Updated 9 years ago
- ☆21Updated 11 years ago
- Contact Tracing BLE sniffer PoC☆82Updated 4 years ago
- a tool designed to help perform and visualize trace-driven cache attacks against software in the secure world of TrustZone-enabled ARMv8 …☆81Updated 6 years ago
- Open Sim Kit (OSK) is FOSS software for editing the content and functions of SIM cards.☆31Updated 12 years ago
- NXP Security Controller (SCCv2) - Linux driver☆19Updated 9 months ago
- Adding trace to DesignStart for easier side-channel analysis on the CW305 target. Also supports PhyWhisperer.☆15Updated 9 months ago
- A tool to perform (higher-order) correlation power analysis attacks (CPA).☆163Updated 3 years ago
- Side-channel toolkit in Julia☆166Updated 3 years ago
- Tool for visualizing and empirically analyzing information encoded in binary files☆79Updated 5 years ago
- New TLS Padding Oracles☆125Updated 2 years ago
- ☆36Updated 8 years ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆21Updated 4 years ago
- Low-Observable Physical Host Instrumentation: A suite of tools supporting introspection and semantic gap reconstruction for both physical…☆30Updated 9 years ago
- Timing Attack on TLS' ECDSA signature☆46Updated 10 years ago
- Process QPSK-demodulated data into transport stream (SCTE 55-1)☆21Updated 9 years ago
- Module for parsing radiotap headers in python☆24Updated 2 years ago
- Extracts files and information from Parrot firmware files.☆15Updated 8 years ago
- The androidvulnerabilities.org website and source data☆22Updated 5 years ago
- RILDefender: An Android Mobile Privacy Protection Service Against SMS Exploits☆15Updated last year
- Repository of code for BLE physical-layer location tracking project☆31Updated 3 years ago
- Repository of the official Docker image for SideChannelMarvels.☆54Updated 7 years ago
- Hulk is able to bruteforce missing bytes after a DCA attack on AES with his special ability of AES-NI☆23Updated 7 years ago
- It contains hardenedlinux community documentation.☆60Updated 2 years ago