NationalSecurityAgency / enigma-simulator
An educational demonstration of breaking the Enigma machine
☆458Updated 4 years ago
Related projects: ⓘ
- Site for NSA's Open Source project listing☆254Updated 3 weeks ago
- DataWave is an ingest/query framework that leverages Apache Accumulo to provide fast, secure data access.☆555Updated this week
- Digest, stat, and copy files from one location to another in the same read pass☆329Updated 5 years ago
- Supporting Data Archives for Ghidra☆170Updated last week
- Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Stor…☆765Updated last year
- Simulate realistic trajectory data seen through sporadic reporting☆144Updated 4 months ago
- ☆88Updated 4 months ago
- SkillTree☆19Updated this week
- Distributed P2P Data-driven Workflow Framework☆243Updated this week
- SkillTree is a micro-learning gamification platform supporting the rapid integration of a gamified tool training approach into new and ex…☆397Updated this week
- Thirteen Years of Tor Attacks☆266Updated last year
- Open-source decompile of Stuxnet/myRTUs☆702Updated 5 years ago
- 3301 - Unmodified files, transcription and other assets.☆175Updated last year
- Source code from Hacking: The Art of Exploitation (Second Edition).☆408Updated 8 months ago
- The platform used to run picoCTF 2019. (deprecated)☆285Updated 4 months ago
- Course materials for hackaday.io Ghidra training☆369Updated 8 months ago
- A generator of weird files (binary polyglots, near polyglots, polymocks...)☆1,125Updated 3 weeks ago
- A command-line utility for generating random passwords, passphrases, and raw keys. #nsacyber☆129Updated 8 months ago
- Prevent RubberDucky (or other keystroke injection) attacks☆513Updated 6 months ago
- Public open-source code of malware Stuxnet (aka MyRTUs).☆951Updated 2 years ago
- Steganography brute-force utility to uncover hidden data inside files☆548Updated 3 years ago
- A java implementation of Enigma, and a modern attack to decrypt it.☆652Updated 2 years ago
- Taking one back for Steve Irwin (๑•̀ㅂ•́)و☆963Updated last year
- Proof-of-concept for the ZombieLoad attack☆812Updated 2 years ago
- Remote video eavesdropping using a software-defined radio platform☆1,321Updated last year
- Material for the YouTube series☆503Updated 2 years ago
- Collection of steganography tools - helps with CTF challenges☆2,369Updated last year
- Kinda useful notes collated together publicly☆491Updated 5 years ago
- SkySafe Miscellaneous Reverse Engineering Blog☆754Updated 8 months ago
- ☆570Updated 7 months ago