NationalSecurityAgency / enigma-simulatorLinks
An educational demonstration of breaking the Enigma machine
☆484Updated 5 years ago
Alternatives and similar repositories for enigma-simulator
Users that are interested in enigma-simulator are comparing it to the libraries listed below
Sorting:
- Site for NSA's Open Source project listing☆297Updated 2 months ago
- Digest, stat, and copy files from one location to another in the same read pass☆337Updated 6 years ago
- DataWave is an ingest/query framework that leverages Apache Accumulo to provide fast, secure data access.☆628Updated last week
- Open-source decompile of Stuxnet/myRTUs☆758Updated 6 years ago
- A java implementation of Enigma, and a modern attack to decrypt it.☆682Updated 3 years ago
- SkillTree☆25Updated last week
- The platform used to run picoCTF 2019. (deprecated)☆302Updated last year
- 🧠 🔎 🤖 Kitsune is an artificial neural network designed to detect and correlate Twitter profiles with similar behaviours.☆244Updated 3 years ago
- Simulate realistic trajectory data seen through sporadic reporting☆162Updated 6 months ago
- Proof-of-concept for the ZombieLoad attack☆817Updated 3 years ago
- A command-line utility for generating random passwords, passphrases, and raw keys. #nsacyber☆143Updated last year
- Poseidon is a python-based application that leverages software defined networks (SDN) to acquire and then feed network traffic to a numbe…☆47Updated 6 years ago
- ☆115Updated 4 years ago
- list of passwords more likely to be used by sysadmins, general nerds, and folk with access☆257Updated 9 months ago
- NSA Cybersecurity. Formerly known as NSA Information Assurance and the Information Assurance Directorate☆284Updated last year
- PwnAdventure3 Server☆649Updated 3 years ago
- Intro to x86 Assembly Language.☆282Updated 5 years ago
- SkillTree is a micro-learning gamification platform supporting the rapid integration of a gamified tool training approach into new and ex…☆508Updated this week
- ☆97Updated 9 months ago
- Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Stor…☆827Updated 8 months ago
- Material for the YouTube series☆510Updated 3 years ago
- Collection of ancient computer virus source codes☆637Updated 3 years ago
- Distributed P2P Data-driven Workflow Framework☆268Updated last week
- A toy Feistel network implementation☆122Updated 5 years ago
- This is a simple collection of instructions and scripts to accompany the computerphile video about mininet and openflow.☆76Updated 4 years ago
- Hundreds of 20th Century viruses; clone this repository to upset your AV☆217Updated 2 years ago
- ☆188Updated 2 years ago
- Intel Atom C2000 series discovery tool that parses log files and returns results if a positive match is found. #nsacyber☆28Updated 8 years ago
- Reverse Engineering Tutorials☆522Updated 7 years ago
- Engineer Man Knowledge Center☆138Updated 2 weeks ago