NationalSecurityAgency / enigma-simulatorLinks
An educational demonstration of breaking the Enigma machine
☆483Updated 4 years ago
Alternatives and similar repositories for enigma-simulator
Users that are interested in enigma-simulator are comparing it to the libraries listed below
Sorting:
- Site for NSA's Open Source project listing☆294Updated 3 weeks ago
- A java implementation of Enigma, and a modern attack to decrypt it.☆682Updated 3 years ago
- The platform used to run picoCTF 2019. (deprecated)☆300Updated last year
- DataWave is an ingest/query framework that leverages Apache Accumulo to provide fast, secure data access.☆625Updated this week
- 3301 - Unmodified files, transcription and other assets.☆186Updated last year
- Digest, stat, and copy files from one location to another in the same read pass☆337Updated 6 years ago
- Poseidon is a python-based application that leverages software defined networks (SDN) to acquire and then feed network traffic to a numbe…☆47Updated 6 years ago
- This is a simple collection of instructions and scripts to accompany the computerphile video about mininet and openflow.☆76Updated 4 years ago
- Prevent RubberDucky (or other keystroke injection) attacks☆525Updated last year
- Public library of space documents and tutorials☆802Updated last year
- Jaws is an invisible programming language! Inject invisible code into other languages and files! Created for security research -- see blo…☆234Updated 4 months ago
- SkillTree☆24Updated 2 weeks ago
- Source code from Hacking: The Art of Exploitation (Second Edition).☆437Updated last year
- Simple tools to make reverse engineering and console cowboying easier, primarily by data translation and manipulation + file handle pipin…☆601Updated last week
- ☆97Updated 8 months ago
- ☆115Updated 4 years ago
- Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Stor…☆824Updated 7 months ago
- Open source release of challenges and other code used in the 2020 Hack-a-Sat Final.☆83Updated 4 years ago
- Collection of ancient computer virus source codes☆633Updated 3 years ago
- This repository contains several applications, demonstrating the Meltdown bug.☆4,145Updated 3 years ago
- list of passwords more likely to be used by sysadmins, general nerds, and folk with access☆259Updated 8 months ago
- A toy Feistel network implementation☆123Updated 5 years ago
- A generator of weird files (binary polyglots, near polyglots, polymocks...)☆1,234Updated 7 months ago
- An attempt to be able to see wifi router locations.☆522Updated 4 years ago
- Audio file steganography. Hides files or text inside audio files and retrieve them automatically☆286Updated 2 years ago
- JCrypTool Core Plug-ins☆169Updated last year
- Open-source decompile of Stuxnet/myRTUs☆755Updated 6 years ago
- The decompiled Morris Worm source code☆630Updated 4 years ago
- DDS workshops at DEFCON☆79Updated last year
- Distributed P2P Data-driven Workflow Framework☆267Updated 2 weeks ago