NationalSecurityAgency / enigma-simulatorLinks
An educational demonstration of breaking the Enigma machine
☆486Updated 5 years ago
Alternatives and similar repositories for enigma-simulator
Users that are interested in enigma-simulator are comparing it to the libraries listed below
Sorting:
- Site for NSA's Open Source project listing☆303Updated 2 months ago
- DataWave is an ingest/query framework that leverages Apache Accumulo to provide fast, secure data access.☆642Updated this week
- Digest, stat, and copy files from one location to another in the same read pass☆338Updated 6 years ago
- Open-source decompile of Stuxnet/myRTUs☆762Updated 7 years ago
- Simulate realistic trajectory data seen through sporadic reporting☆163Updated 9 months ago
- Poseidon is a python-based application that leverages software defined networks (SDN) to acquire and then feed network traffic to a numbe…☆47Updated 6 years ago
- 3301 - Unmodified files, transcription and other assets.☆186Updated 2 years ago
- SkillTree is a micro-learning gamification platform supporting the rapid integration of a gamified tool training approach into new and ex…☆516Updated this week
- A java implementation of Enigma, and a modern attack to decrypt it.☆685Updated 3 years ago
- Distributed P2P Data-driven Workflow Framework☆269Updated this week
- A toy Feistel network implementation☆123Updated 5 years ago
- Simple tools to make reverse engineering and console cowboying easier, primarily by data translation and manipulation + file handle pipin…☆607Updated 3 months ago
- Source code from Hacking: The Art of Exploitation (Second Edition).☆445Updated last year
- Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Stor…☆829Updated 10 months ago
- ☆188Updated 3 years ago
- Data-driven automation platform☆309Updated 2 years ago
- The platform used to run picoCTF 2019. (deprecated)☆309Updated last year
- DDS workshops at DEFCON☆82Updated last year
- 🧠 🔎 🤖 Kitsune is an artificial neural network designed to detect and correlate Twitter profiles with similar behaviours.☆244Updated 3 years ago
- Prevent RubberDucky (or other keystroke injection) attacks☆529Updated last year
- Public open-source code of malware Stuxnet (aka MyRTUs).☆1,142Updated 3 years ago
- ☆115Updated 4 years ago
- Jaws is an invisible programming language! Inject invisible code into other languages and files! Created for security research -- see blo…☆234Updated 7 months ago
- ☆221Updated 5 years ago
- list of passwords more likely to be used by sysadmins, general nerds, and folk with access☆259Updated 11 months ago
- Proof-of-concept for the ZombieLoad attack☆819Updated 3 years ago
- PwnAdventure3 Server☆653Updated 4 years ago
- A command-line utility for generating random passwords, passphrases, and raw keys. #nsacyber☆143Updated last year
- Salamandra is a tool to find spy microphones that use radio freq to transmit. It uses SDR.☆839Updated 4 years ago
- Material for the YouTube series☆510Updated 3 years ago