Need help with chipwhisperer?
Click the “chat” button below for chat support from the developer who created it, or find similar developers for support.

About the developer

657 Stars 198 Forks Other 4.4K Commits 42 Opened issues


ChipWhisperer - the complete open-source toolchain for side-channel power analysis and glitching attacks

Services available


Need anything else?

Contributors list


Documentation Status

Discord | Hardware Docs | Documentation | Forum | Store | NewAE

ChipWhisperer is an open source toolchain dedicated to hardware security research. This toolchain consists of several layers of open source components: * Hardware: The ChipWhisperer uses a capture board and a target board. Schematics and PCB layouts for the ChipWhisperer-Lite capture board and a number of target boards are freely available. * Firmware: Three separate pieces of firmware are used on the ChipWhisperer hardware. The capture board has a USB controller (in C) and an FPGA for high-speed captures (in Verilog) with open-source firmware. Also, the target device has its own firmware; this repository includes many firmware examples for different targets. * Software: The ChipWhisperer software includes a Python API for talking to ChipWhisperer hardware (ChipWhisperer Capture) and a Python API for processing power traces from ChipWhisperer hardware (ChipWhisperer Analyzer). You can find documentation for our Python API at

Getting Started

First time using ChipWhisperer? Check out these links: * Getting started * Installing ChipWhisperer if you're trying to set up this software package * Hardware Docs for hardware information. Also has helpful comparison between different NewAE products.

ChipWhisperer 5.5: All-in-one installer, Serial Port, ECC, and Segmented Capture

ChipWhisperer 5.5 has brought some exciting new features that make it easier to use and allow you to do some cool new things:

  1. The ChipWhisperer Windows installer now includes everything you need to use ChipWhisperer, including Python/Juptyer, Git, Make, and compilers! For more information, check out our Windows installer page on ReadTheDocs.
  2. ChipWhisperer capture devices (CWLite, Nano, Pro, etc.) have gotten a new firmware update that gives them a USB-CDC serial port for talking over USART. This means you can use your favourite serial program, such as PuTTy, to talk to and listen to the target's USART communication. For more info, see our rtfm serial port page.
  3. We've recently added two ECC power analysis attack notebooks. One attacks a hardware ECC implementation running on the CW305 and the other attacks a software ECC implementation running on a microcontroller. Both can be found in
  4. There's a new segmented capture mode that allows you to fill the ChipWhisperer capture buffer with multiple power traces before transferring data to the PC. This greatly reduces the overhead on trace transfer, allowing capture speeds of 1000+ captures/second for FPGA AES implementations. See our API documentation to see how to use it.

Also, if you haven't checked it out yet, ChipWhisperer 5.4 included TraceWhisperer, which allows you to use Arm trace to timestamp microcontroller operations/functions in your powertrace. It requires a CW305 or PhyWhisperer. For more information, see

GIT Source

Note all development occurs on the develop branch. If you are looking for bleeding edge it's NOT on master - we push each release (and possibly any critical changes) to master. This means that "master" always gives you the latest known-working branch, but there may be new features on the "develop" branch.


Stuck? If you need a hand, there are a few places you can ask for help: * The NewAE Forum is full of helpful people that can point you in the right direction * If you find a bug, let us know through the issue tracker

ChipWhisperer is a trademark of NewAE Technology Inc., registered in the US, Europe, and China.

We use cookies. If you continue to browse the site, you agree to the use of cookies. For more information on our use of cookies please see our Privacy Policy.