NationalSecurityAgency / enigma-simulatorLinks
An educational demonstration of breaking the Enigma machine
☆487Updated 5 years ago
Alternatives and similar repositories for enigma-simulator
Users that are interested in enigma-simulator are comparing it to the libraries listed below
Sorting:
- Site for NSA's Open Source project listing☆308Updated 3 months ago
- DataWave is an ingest/query framework that leverages Apache Accumulo to provide fast, secure data access.☆648Updated last week
- Digest, stat, and copy files from one location to another in the same read pass☆339Updated 6 years ago
- 3301 - Unmodified files, transcription and other assets.☆187Updated 2 years ago
- A java implementation of Enigma, and a modern attack to decrypt it.☆685Updated 3 years ago
- Hundreds of 20th Century viruses; clone this repository to upset your AV☆223Updated 3 years ago
- A toy Feistel network implementation☆124Updated 5 years ago
- Public library of space documents and tutorials☆840Updated last year
- Open-source decompile of Stuxnet/myRTUs☆765Updated 7 years ago
- Poseidon is a python-based application that leverages software defined networks (SDN) to acquire and then feed network traffic to a numbe…☆47Updated 6 years ago
- Simulate realistic trajectory data seen through sporadic reporting☆164Updated 10 months ago
- Proof-of-concept for the ZombieLoad attack☆824Updated 4 years ago
- The platform used to run picoCTF 2019. (deprecated)☆311Updated last year
- An attempt to be able to see wifi router locations.☆525Updated 5 years ago
- Supporting Data Archives for Ghidra☆199Updated last month
- Material for the YouTube series☆511Updated 3 years ago
- This is a simple collection of instructions and scripts to accompany the computerphile video about mininet and openflow.☆76Updated 4 years ago
- Build Python 3 applications that integrate with Apache Accumulo☆34Updated 2 years ago
- PwnAdventure3 Server☆655Updated 4 years ago
- The beer-garden application☆278Updated 2 weeks ago
- 🧠 🔎 🤖 Kitsune is an artificial neural network designed to detect and correlate Twitter profiles with similar behaviours.☆244Updated 3 years ago
- A command-line utility for generating random passwords, passphrases, and raw keys. #nsacyber☆144Updated 2 years ago
- cicada-2014☆50Updated 3 years ago
- Collection of ancient computer virus source codes☆643Updated 4 years ago
- Distributed P2P Data-driven Workflow Framework☆270Updated this week
- list of passwords more likely to be used by sysadmins, general nerds, and folk with access☆261Updated 3 weeks ago
- This repository contains several applications, demonstrating the Meltdown bug.☆4,162Updated 3 years ago
- Data-driven automation platform☆311Updated 2 years ago
- Prevent RubberDucky (or other keystroke injection) attacks☆528Updated last year
- The decompiled Morris Worm source code☆642Updated 5 years ago