{"payload":{"pageCount":1,"repositories":[{"type":"Public","name":"Deadpool","owner":"SideChannelMarvels","isFork":false,"description":"Repository of various public white-box cryptographic implementations and their practical attacks.","topicNames":[],"topicsNotShown":0,"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":2,"starsCount":606,"forksCount":117,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-04-10T11:36:56.049Z"}},{"type":"Public","name":"BlueGalaxyEnergy","owner":"SideChannelMarvels","isFork":false,"description":"A tool to perform so called BGE attack","topicNames":[],"topicsNotShown":0,"primaryLanguage":{"name":"C++","color":"#f34b7d"},"pullRequestCount":0,"issueCount":0,"starsCount":19,"forksCount":1,"license":"Apache License 2.0","participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,1,1,0,0,0,0,1,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-04-09T14:23:06.577Z"}},{"type":"Public","name":"Tracer","owner":"SideChannelMarvels","isFork":false,"description":"Set of Dynamic Binary Instrumentation and visualization tools for execution traces.","topicNames":[],"topicsNotShown":0,"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":12,"starsCount":293,"forksCount":67,"license":"GNU General Public License v3.0","participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,1,0,2,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-03-31T00:03:54.309Z"}},{"type":"Public","name":"Stark","owner":"SideChannelMarvels","isFork":false,"description":"Repository of small utilities related to key recovery","topicNames":[],"topicsNotShown":0,"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":0,"starsCount":174,"forksCount":51,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-03-30T23:13:53.714Z"}},{"type":"Public","name":"JeanGrey","owner":"SideChannelMarvels","isFork":false,"description":"Tools to perform differential fault analysis attacks (DFA).","topicNames":[],"topicsNotShown":0,"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":267,"forksCount":70,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-10-13T07:43:07.839Z"}},{"type":"Public","name":"DarkPhoenix","owner":"SideChannelMarvels","isFork":false,"description":"Tool to perform differential fault analysis attack (DFA) on whiteboxes with external encodings.","topicNames":[],"topicsNotShown":0,"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":9,"forksCount":1,"license":"Apache License 2.0","participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-02-10T14:02:05.504Z"}},{"type":"Public","name":"Daredevil","owner":"SideChannelMarvels","isFork":false,"description":"A tool to perform (higher-order) correlation power analysis attacks (CPA).","topicNames":[],"topicsNotShown":0,"primaryLanguage":{"name":"C++","color":"#f34b7d"},"pullRequestCount":1,"issueCount":9,"starsCount":149,"forksCount":37,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-01-27T22:38:06.008Z"}},{"type":"Public","name":"fork-cryptolu-whitebox-tools","owner":"SideChannelMarvels","isFork":true,"description":"White-box Analysis and Implementation Tools","topicNames":[],"topicsNotShown":0,"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":12,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-01-27T12:15:54.345Z"}},{"type":"Public","name":"fork-jlsca","owner":"SideChannelMarvels","isFork":true,"description":"Side-channel toolkit in Julia","topicNames":[],"topicsNotShown":0,"primaryLanguage":{"name":"Julia","color":"#a270ba"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":32,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-01-14T04:42:44.237Z"}},{"type":"Public","name":"fork-adaptive-SCA","owner":"SideChannelMarvels","isFork":true,"description":"Adaptive side-channel analysis on white-box block cipher implementations","topicNames":[],"topicsNotShown":0,"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":3,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-08-01T11:29:37.618Z"}},{"type":"Public","name":"DrStrange","owner":"SideChannelMarvels","isFork":false,"description":"Repository of small utilities related to trace conversion","topicNames":[],"topicsNotShown":0,"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":10,"forksCount":3,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-06-21T00:15:02.815Z"}},{"type":"Public","name":"fork-jlsca-tutorials","owner":"SideChannelMarvels","isFork":true,"description":"Tutorials and examples on how to use Jlsca, the high-performance side channel analysis toolkit written in Julia","topicNames":[],"topicsNotShown":0,"primaryLanguage":{"name":"Jupyter Notebook","color":"#DA5B0B"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":5,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-02-15T06:50:24.476Z"}},{"type":"Public","name":"fork-klemsa-White-Box-DPA-Processing","owner":"SideChannelMarvels","isFork":true,"description":"Scripts for trace acquisition, filtering, processing and displaying results.","topicNames":[],"topicsNotShown":0,"primaryLanguage":{"name":"Ruby","color":"#701516"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":3,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2019-08-08T17:02:00.511Z"}},{"type":"Public","name":"Hulk","owner":"SideChannelMarvels","isFork":true,"description":"Hulk is able to bruteforce missing bytes after a DCA attack on AES with his special ability of AES-NI","topicNames":[],"topicsNotShown":0,"primaryLanguage":{"name":"C++","color":"#f34b7d"},"pullRequestCount":0,"issueCount":0,"starsCount":22,"forksCount":10,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2018-11-27T13:12:32.061Z"}},{"type":"Public","name":"Orka","owner":"SideChannelMarvels","isFork":false,"description":"Repository of the official Docker image for SideChannelMarvels.","topicNames":[],"topicsNotShown":0,"primaryLanguage":{"name":"Shell","color":"#89e051"},"pullRequestCount":0,"issueCount":2,"starsCount":53,"forksCount":22,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2018-02-06T09:20:34.530Z"}}],"repositoryCount":15,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"mirror","text":"Mirrors"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"Repositories"}