NationalSecurityAgency / enigma-simulator
An educational demonstration of breaking the Enigma machine
☆477Updated 4 years ago
Alternatives and similar repositories for enigma-simulator:
Users that are interested in enigma-simulator are comparing it to the libraries listed below
- Site for NSA's Open Source project listing☆284Updated 5 months ago
- Digest, stat, and copy files from one location to another in the same read pass☆333Updated 5 years ago
- Supporting Data Archives for Ghidra☆181Updated 2 weeks ago
- DataWave is an ingest/query framework that leverages Apache Accumulo to provide fast, secure data access.☆606Updated this week
- Open-source decompile of Stuxnet/myRTUs☆746Updated 6 years ago
- Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Stor…☆800Updated 4 months ago
- SkillTree☆22Updated 3 weeks ago
- SkillTree is a micro-learning gamification platform supporting the rapid integration of a gamified tool training approach into new and ex…☆464Updated this week
- LiME (formerly DMD) is a Loadable Kernel Module (LKM), which allows the acquisition of volatile memory from Linux and Linux-based devices…☆1,805Updated 6 months ago
- stuxnet Source & Binaries. (+PLC ROOTKIT) ONLY FOR ACADEMICAL RESEARCH AND EDUCATIONAL PURPOSES! Includes: Source files, Binaries, PLC Sa…☆211Updated 7 months ago
- The Binary Analysis Metadata tool gathers information about Windows binaries to aid in their analysis. #nsacyber☆158Updated 11 months ago
- RIDL test suite and exploits☆355Updated 4 years ago
- ☆468Updated 5 months ago
- The Official Radare2 Book☆834Updated last month
- ☆93Updated 5 months ago
- Course materials for Advanced Binary Deobfuscation by NTT Secure Platform Laboratories☆1,116Updated 4 years ago
- Prevent RubberDucky (or other keystroke injection) attacks☆525Updated last year
- Proactively-secure Accumulo with Cryptographic Enforcement (PACE) adds client-side encryption and signatures to Accumulo.☆14Updated last year
- A java implementation of Enigma, and a modern attack to decrypt it.☆668Updated 2 years ago
- Distributed P2P Data-driven Workflow Framework☆257Updated this week
- An open source interactive disassembler☆1,056Updated 5 years ago
- A curated list of Community Plugins and Scripts written for Cutter☆283Updated 2 years ago
- Proof of Concepts (PE, PDF...)☆1,500Updated 4 months ago
- Scripts for the Ghidra software reverse engineering suite.☆1,076Updated 4 years ago
- ☆445Updated 5 months ago
- Public library of space documents and tutorials☆782Updated 11 months ago
- Psychological warfare in reverse engineering☆998Updated 5 years ago
- A not so awesome list of malware gems for aspiring malware analysts☆805Updated 2 years ago
- Create root and intermediate Certificate Authorities, issue user and server certificates, etc. for testing purposes.☆105Updated 2 months ago
- Reverse Engineering using Radare2☆318Updated 3 years ago