Skip to content
View Kiooku's full-sized avatar

Block or report Kiooku

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results
Jupyter Notebook 1 Updated Mar 11, 2025

Power Analysis Attacks of some of the finalists to the NIST Lightweight Cryptography Contest, implemented in Python on the ChipWhisperer framework

Python 2 4 Updated Mar 3, 2022

Exercises for (legacy) Computer Security course in the University of Oulu

Python 45 110 Updated Aug 1, 2023

A curated list of RemNote plugins, themes, tutorials and other resources.

CSS 353 19 Updated Feb 5, 2025

PhyWhisperer-USB: Hardware USB Trigger

C 89 23 Updated Mar 22, 2024

Ledger's Advanced Side-Channel Analysis Repository

Python 385 56 Updated Sep 5, 2023

Interactive ChipWhisperer tutorials using Jupyter notebooks.

Jupyter Notebook 264 78 Updated Mar 20, 2025

ChipWhisperer - the complete open-source toolchain for side-channel power analysis and glitching attacks

C 1,196 301 Updated Apr 10, 2025

american fuzzy lop - a security-oriented fuzzer

C 3,862 653 Updated Jul 5, 2021

🌪️ Application fuzzer

C 430 79 Updated Dec 11, 2022

Make your first side-channel attack on public datasets with eShard. This is a mirror of scared Gitlab repository. All contributions and merge request must be done through Gitlab project.

Python 89 20 Updated Jan 16, 2023

SCALE: Side-Channel Attack Lab. Exercises

43 14 Updated Sep 20, 2023

Some cybersecurity projects I made.

Rust 1 Updated Mar 2, 2024

Port of OpenAI's Whisper model in C/C++

C++ 39,230 4,113 Updated Apr 14, 2025

A security oriented SoC featuring a custom pipelined RISC-V core and LCD-TFT controller

Verilog 12 2 Updated Dec 26, 2020

GoFetch: Breaking Constant-Time Cryptographic Implementations Using Data Memory-Dependent Prefetchers -- USENIX Security'24

C 256 19 Updated Jun 21, 2024

Side-Channel Analysis Library

C++ 84 22 Updated Apr 11, 2025

Side Channels Analysis and Deep Learning

Python 205 61 Updated Mar 13, 2023

Robust Speech Recognition via Large-Scale Weak Supervision

Python 79,940 9,604 Updated Jan 4, 2025

This repository contains several tools to perform Cache Template Attacks

C 148 63 Updated Sep 6, 2023

Generation of diagrams like flowcharts or sequence diagrams from text in a similar manner as markdown

TypeScript 78,063 7,354 Updated Apr 14, 2025

Reinforcement learning environments for compiler and program optimization tasks

Python 942 127 Updated Oct 9, 2024

Free and Open Source Reverse Engineering Platform powered by rizin

C++ 16,356 1,190 Updated Apr 14, 2025

This tool lets you search your gadgets on your binaries to facilitate your ROP exploitation. ROPgadget supports ELF, PE and Mach-O format on x86, x64, ARM, ARM64, PowerPC, SPARC, MIPS, RISC-V 64, a…

Python 4,099 563 Updated Jan 28, 2025

Companion notebooks to the Hardware Hacking Handbook

Jupyter Notebook 73 9 Updated Oct 17, 2021

SCAAML: Side Channel Attacks Assisted with Machine Learning

Python 144 46 Updated Apr 14, 2025

Microsoft Threat Intelligence Security Tools

Python 1,840 326 Updated Apr 8, 2025

Active Directory and Internal Pentest Cheatsheets

HTML 1,378 271 Updated Apr 10, 2025

Hardware/IOT Pentesting Wiki

HTML 597 136 Updated Apr 9, 2025
Next