NationalSecurityAgency / enigma-simulatorLinks
An educational demonstration of breaking the Enigma machine
☆480Updated 4 years ago
Alternatives and similar repositories for enigma-simulator
Users that are interested in enigma-simulator are comparing it to the libraries listed below
Sorting:
- DataWave is an ingest/query framework that leverages Apache Accumulo to provide fast, secure data access.☆610Updated this week
- Site for NSA's Open Source project listing☆288Updated 6 months ago
- The platform used to run picoCTF 2019. (deprecated)☆298Updated last year
- Digest, stat, and copy files from one location to another in the same read pass☆334Updated 6 years ago
- SkillTree☆23Updated 2 weeks ago
- A java implementation of Enigma, and a modern attack to decrypt it.☆676Updated 3 years ago
- Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Stor…☆810Updated 5 months ago
- Supporting Data Archives for Ghidra☆184Updated last week
- A command-line utility for generating random passwords, passphrases, and raw keys. #nsacyber☆136Updated last year
- ☆94Updated 6 months ago
- Distributed P2P Data-driven Workflow Framework☆259Updated 3 weeks ago
- Retired beginner/intermediate malware analysis training materials from @pedramamini and @erocarrera.☆896Updated 5 years ago
- The Binary Analysis Metadata tool gathers information about Windows binaries to aid in their analysis. #nsacyber☆159Updated last year
- Course Repository for University of Cincinnati Malware Analysis Class (CS[567]038)☆777Updated 7 months ago
- Prevent RubberDucky (or other keystroke injection) attacks☆525Updated last year
- Kinda useful notes collated together publicly☆493Updated 6 years ago
- Rhme2 challenge (2016)☆319Updated 7 years ago
- Public library of space documents and tutorials☆789Updated last year
- NSA Cybersecurity. Formerly known as NSA Information Assurance and the Information Assurance Directorate☆278Updated 9 months ago
- A WebSocket library for use with Apache Accumulo☆61Updated last week
- SkySafe Miscellaneous Reverse Engineering Blog☆767Updated last year
- This is a collection of legal wording and documentation used for physical security assessments. The goal is to hopefully allow this as a …☆478Updated 5 years ago
- Voyager's Golden Disk Image Browser☆389Updated 6 years ago
- An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction☆1,108Updated 3 years ago
- An archive of low-level CTF challenges developed over the years☆633Updated 3 years ago
- CTF Cheatsheet☆81Updated last month
- stuxnet Source & Binaries. (+PLC ROOTKIT) ONLY FOR ACADEMICAL RESEARCH AND EDUCATIONAL PURPOSES! Includes: Source files, Binaries, PLC Sa…☆213Updated 9 months ago
- Solutions to a variety of Capture The Flag challenges from different competitions.☆211Updated 6 years ago
- Source code for the book "Violent Python" by TJ O'Connor. The code has been fully converted to Python 3, reformatted to comply with PEP8 …☆989Updated 2 years ago
- Writeups for infosec Capture the Flag events by team Galaxians☆426Updated 2 years ago